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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) r3 = geteuid() fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000540)='./file0\x00', 0xc000, r3, r4, 0x3b54, 0x2000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:12:47 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x7fffffff}, 0x8, 0x0) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:47 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:12:47 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)=0x0) io_destroy(r1) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x8864]}}, 0x1c) [ 224.468369] device bridge_slave_1 left promiscuous mode [ 224.473976] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.528752] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 224.536773] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 224.545452] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 224.559938] device bridge_slave_0 left promiscuous mode [ 224.565577] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.661997] IPVS: ftp: loaded support on port[0] = 21 [ 224.718924] IPVS: ftp: loaded support on port[0] = 21 [ 224.718978] team0 (unregistering): Port device team_slave_1 removed [ 224.734710] team0 (unregistering): Port device team_slave_0 removed [ 224.745310] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 224.759579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 224.785911] bond0 (unregistering): Released all slaves [ 225.839793] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.846207] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.862929] device bridge_slave_0 entered promiscuous mode [ 225.930191] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.936609] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.952854] device bridge_slave_1 entered promiscuous mode [ 225.961804] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.968191] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.982966] device bridge_slave_0 entered promiscuous mode [ 226.029722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.048012] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.054463] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.063206] device bridge_slave_1 entered promiscuous mode [ 226.072303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.129990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.166853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.252729] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.307134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.323013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.344153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.356123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.387939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.394817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.405041] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.454356] device bridge_slave_1 left promiscuous mode [ 226.459897] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.470616] device bridge_slave_0 left promiscuous mode [ 226.476218] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.505689] team0 (unregistering): Port device team_slave_1 removed [ 226.515446] team0 (unregistering): Port device team_slave_0 removed [ 226.525866] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 226.542286] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 226.569053] bond0 (unregistering): Released all slaves [ 226.592850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.600111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.622243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.629775] team0: Port device team_slave_0 added [ 226.637451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.644915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.685837] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.694090] team0: Port device team_slave_1 added [ 226.734709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.806753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.854780] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.863814] team0: Port device team_slave_0 added [ 226.879830] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.887359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.902393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.918873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.930541] team0: Port device team_slave_1 added [ 226.937419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.944869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.957572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.977306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.036247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.116315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.123489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.137945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.180623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.187782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.204687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.562637] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.569076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.575721] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.582092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.589532] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.861616] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.868052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.874676] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.881087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.888701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.383145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.397314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.142489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.265862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.274216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.382801] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.394859] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.401118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.408284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.509142] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.515598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.524530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.543006] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.637461] 8021q: adding VLAN 0 to HW filter on device team0 01:12:53 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x34000]}}, 0x1c) 01:12:53 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)=0x0) io_destroy(r1) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:12:53 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:12:53 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() 01:12:53 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:12:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) sendmmsg$alg(r0, &(0x7f0000005b00)=[{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000200)="b004506dec4d795342ad439bfd6ff08cb4ad79f7851bc61bf8ff55221bfce131b268497337083e3796bbe0081756b8792de4bebff066381d1dda63fda131d1a4d7b59dcb36ed00cd318ca915acb3265b6ae0ef6eeac971e1c10591ccc1e80ca1dde1ae6399b4368fd608317c2d326df8cda11c42e5d9cade213c6adc4da92a5c2095acd77a3daa8eae63e17fbeca099220e7da1307a66839ec97b5fbf425e65240ebc54163099ffbe03aca027c35300c30", 0xb1}, {&(0x7f00000002c0)="8470cf2bd5aed7a4", 0x8}, {&(0x7f0000000300)="72facb1070df63b33e47a7ab5e49428f4ba66fd5af56ff6a6631a453dfeddbd10d18fd45c7b3d921f89471b62b82cf71f14ecee8ef6dc7318d391176715d0977d04a7dd796a3f1f8f2603fc4a44a8c3a86994ce41da6128dfb91d16438491867af1463aa2a62ade4ae69dc68e6753abf282fe10d6a0781f04c4241bab023e62c89f829c3868a305ec2bce6bfd043130235d5ab927f9f92d6dded38a57d31245f5fc69fb068500eb64fe77f053a6c35f7e588bb899f3f9a750af6411fa11fca1920a7cf82118ff5102d482935d4c5248a935f142d2fd260f61f8ff483a41dc385722e9d2988a52d", 0xe7}, {&(0x7f0000000640)="31b8d64ea95d23cfc70c6567c1ed3fed9874408bcf852a6bd5fa9623c8b91039a7b0705d7b75af82d4686ab4a24f4abc3efe063207d143bc4ef10e91a7bb5e6efa9937abda1343fca31eafd8088c3cbacae280d34dc1833b0d2f822b48a56d782e905fa24a152e0132e77211db4bb30d4b4fff5858c120c07a5154247a925776183180abb8bb436da86fb3c4adc6e3c040b0bacc326776", 0x97}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000000700)="373bf22df67dc612f4236b285d0a091f4b2992927ddf29f1ff0c0e60597139bf52cc1afaf4ee208a0080da499741a1f31f5500c0432153ee3813c6cc97fa23c4c5651467947cc71cbd22568dd809b15cbcba6bed1f29412f9f377ac838d8344cc71d1cebaf7b10a8c3eea4d65ec235b78e20328134755a7334f1206edda439886e15972412e3ef391e1a82a83d87b28e95cd3ef8d2d193f1bbc7870bb69e197177d071b8dde369fc27d33582b8d054500c593cf4119152ca5d95064d2879f831a3504414633eb97687193bfd63300c6dbc4658b68272c99c685e1c672f", 0xdd}, {&(0x7f0000000400)="8b53d5d2a255b920423db41463840eb8cbb13329e614ed4b47809c8efd984f9cc6c81ef06190884b0819ec1b0dae786e407cb467180936b2be717e4a06ca951af739bc9be2eb", 0x46}, {&(0x7f0000000800)="95d398a6576b5f5c80afcdcf0697dd773db51f05243a73c9d8e9065f51e265811e0373a34f9a2fee51c5d191bc07721e13d18f4cfd0385b89e5c69cf81630a2b2a424221d8f42054950482e162b32abc246c3ff85066c7d22b54b62a55b2d91a2e07fdff3c88d2474e21dd53db6cb243e8b92c6bf48381877ac5bcebe84f21736e9bc84c35d0ade7ad386cc7886929920a945ac43fdff6d4377a4801242ba6e478e86156333b6f61d1d4bc780cf7b90f45fe2f8c14dfcc39b89bb6bd4dc4a04ec6b7f3ed3fd9b2902315c3785d3ba5323b012adf61e17d67dee3c4dcd2e53ced", 0xe0}, {&(0x7f0000002400)="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", 0x1000}, {&(0x7f0000000900)="fe8aadd36fe058eb06a073b58f14822b", 0x10}], 0xa, &(0x7f0000000a00)=[@op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x30, 0x4}, {0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000a40)="17de07c2885df1d41b4628ef3cde3d7988c590a4d0df58f0dcc6cb2efb395c84fa2899f00f902b0c6839a1d8a9303b9f13cd8963846847f55af8512f0088f5ee5cd0b2fb87990522f5", 0x49}, {&(0x7f0000000ac0)="0bc0aa86913fe6c2bf3c7e46b59cc0092316907210d19adfd7c7e27531151c3aa53a55ef84eb3eb51e00788e1bea3ecc2bd60ebc764c761c85e61d5c377287b5", 0x40}, {&(0x7f0000003400)="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", 0x1000}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)="b8", 0x1}, {&(0x7f0000000b80)="c2a1fdd021d7f4dba3443d5fbf99a714827366d59d09a73ba51ccbfa257274cff0d0221a265ffeebc8ff700fa73be63d695634eaaaa2157d22454adbd42f6a64da5ffd318037814eaa4960349aab009125be98b9832060ce7fc6a424e56829f6a2db6487028d1f97d2bae2c2b53c044983dc212bb076356d0477c7661aa863fa0e23051ba896ffb14ec40c1c3fb18deec848c236c9f52cddebeb5de1ea213534d61e7461d181926559f35d9ed1c5e38eb93eb7c33fcea5d0c7", 0xb9}, {&(0x7f0000000c40)="80eadc6a0ed6540d234f4e791835b97269d8fce66ee3702ebf755602c6cbc05fff005cb01030fd98c178e450b88cb89d3c7f3b913c96b55e01929de480cf41d4a4139a5dced08080ef28ccc1ded2dd216724322d41466a2689bb7d7de604feb635ccd2de3fb3c4b7f12d549bce121e578fbcd991a4832a54621a57333fb9e6c71f0940709e57e51a7a1816a4da0cc599e307969f401b033923bd52cd7e957dfdeaf0d18f86", 0xa5}], 0x7, &(0x7f0000004400)=[@iv={0x100, 0x117, 0x2, 0xe5, "f6f10d56f0157828b5438c85833dafcc6bab57f41f3c31019ce7a9aaa6a6766422a4b5d0cc45237ad27164679251df9fde82bc857689d5766b30068ce96d8716c11a764fc420673fd2b1c974cdc09e75fd5f86ab2befe7569df753e2fac8df4e680727688b164e1f00aca1ab1f21ea82ccf5943c218cfef3c42a742117bb4d1292b7f0f3c68f7f7bf7afb9855d8be54ee177b8cf4cc4d85ac651d8bb9a814e01da899ed19d1f71509316615c4284aba4ff9404c339fffed7306a21eb4a75aa09fb0e2be4d877fdd336f3ae8735402b97243d689a93785a8c31eaa2e992f831e46919d55eff"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x80000000}], 0x1130, 0x1}, {0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000d80)="9841ef22ed23cd5563bbc77d45b3153c9fa2a0cbb366f3270cfea12b3ba33a712f5beb87616cc28d7cc60d59414fd30b26f6ebadbafa380e47b683edab012d6ade37f6feefbf64eb7fcf65303596ddde1ebb5915fb8ee46d650c09a5709028155a3f6de01c328aa5dd27e8807a3e6ba159132a19aad3b2810a83eb243ec1da2b5a5bb51119ddd32f11b4615fbb571a", 0x8f}, {&(0x7f0000000e40)="8a59eedede7659cab799e1642ff2dfbedf52cac70ad30bb104b3a8a43a012166c343041cfb8a666c86702971146a84a7a6f53ae12b476485acb5f25e16c388a04743776a137bd74a", 0x48}], 0x2, &(0x7f0000000f00)=[@op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0xff}, @assoc={0x18, 0x117, 0x4, 0xff}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0x80000000}, @iv={0x28, 0x117, 0x2, 0xd, "f82fa3d56868759c58dcb9ff4e"}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3}], 0xe8, 0x40000}, {0x0, 0x0, &(0x7f0000001000)=[{&(0x7f00000011c0)="d5cb10a3d8cd039a3b80b6cd032bd302d0491bf95fd8a1708f89f72a10e2b5fcc8e12ce5fa7635e170b1f816150ca135d9670ca09fd1ed785a3bdc830dde75452a5ea41953f0fb52741b47ae6548f9096d44", 0x52}], 0x1, &(0x7f0000005540)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x38, 0x117, 0x2, 0x24, "06371dff4b5d9f4f50a309597c341129ff9dcc413a21389df7b46e29a77991c8a4700633"}, @assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x100}, @iv={0x108, 0x117, 0x2, 0xf1, "fb0713a229f624248ff7ad7696b3a82b9f1e5bbd198b3d529c59eb8043b94a8dea8fbbf14f749ed27b558471f411687966bfa45a8c005de17d55c86a13cb20b1b4a7ce9d3c3fcdb51d0c47a6758e77e78b046441654183de4ec1babb2457f661ecd6241db9d445f843a84cbef52a5078093b338b9f1999f4bf2990c7126e50c83db711efb6102f5489a312b165be5a63cf7b4ae45c589080b88b10a88a780bcd0680240d0dd004fde47a5800556cde77d2303713dd9a475fa9d8709a3dc37011b956f3929b1d27813bd571479b35a9e788457deec0b6ad91e793b4e30da59eee225bc9004429ef0b610ee482c428cd3aca"}], 0x1a0, 0x20008004}, {0x0, 0x0, &(0x7f0000005a40)=[{&(0x7f0000001240)="de169d79f624e330ee4b354d018d1029316a70191061530f091256af35d4d55e162de69740776fe7333511041e646f6b68f70b6715ea16a7618d7ba5aa6738d353ccbf94e5072fb37ade3c57d61f8003f43050a49465adef0606d78828be4b5a1e33b2e8ad6a27856a5e7e68b42e402c4ec80bcb707dca12f3b6713fa72ef974e888663b92db7bce1784ac70967304868d539b1f1ca62859", 0x98}, {&(0x7f0000001380)="d74fe09e4cd2217462361eac08a00f6276901666aa58a5011adbffafc8e376397a9a3d571100a464de269d3ba17435c805848cc6c26f09d414ea86598e", 0x3d}, {&(0x7f0000005700)="d4f48466a87417e551a24760e7ee7d49add8a1ca49b1aceed184e998", 0x1c}, {&(0x7f0000005740)="71f52105216eaf1a5b2c356dd99c4f0b005b82ec5e0b063500f78230f069f277584c35f99a96fb977e6d7f3fbeace58f9f342e198dcc342032fe657e8aa199f3a4f85c35afd15f9f90a305efbfd53f9190382932ebacde1519d9efe4c5bcbce07e5ae472635bf5ac7ae3e62b57b7368fa3132b96cf369f55ff024ad3d1446a84b2c3bcfbd7543471f976dbb39a8661cd3fb1c631c6c319230adc61ee25e0ec687c2cf80102380086cfa73f", 0xab}, {&(0x7f0000005800)="edb9e26727d45ae4978713db4a0800679a5f124a23edb0384bd28a024f06eef0001c689c286e7c23e7fc4c3c501d6e195a28dbba0d29872e1454d930c0d111ccfb76", 0x42}, {&(0x7f0000005880)="fd715d9796170e327249211e924443470dca6563b272d329b7bcd7040ea69e7c75f3067f7a6e05863aa3079e10b02ca547ba2bc5cea643f871093b86e4fb8e947fcd71cf0cdd96cd275508843c9aa6454cc516ac41b042c5d1ed88da53a1de1d9304be43945324c75eded050527b5f37f98956c2db8277f42f7668daeaa0edcec9903274f16c1edde553003cb90a4698b66adacba30bfe6b2ce8e11348b4", 0x9e}, {&(0x7f0000005940)="e8d4c1193bc39fdaf18242c9849d082ecc2c6cdc2dfbec76d69bf6d32d0f9fe35b6850d721b9047bfff7e39da89ba8e96eff5d83a3e2e1320efcf1add1c1e57da9a15564668bfed8ca5ad25e6eca2f5c539aad2351e07035c4b65901f5d5f7f23eba9a1ea218db67845cf12e7223cf2fdcd5c03e36e2ea2fa7d57f3fcb9be452a9845a7bc95ccb792bd197d6b4d68915b5f08d43d68c6ea9eb18caa5d9b124626d4d3eb88b91154ccd85f3c2e072c9aa687452d87880f5", 0xb7}, {&(0x7f0000005a00)="c99c686c2b18f0f22467e0f6f25c309656d7216afe13d43e98262cf3aeaf", 0x1e}], 0x8, &(0x7f0000005ac0)=[@op={0x18, 0x117, 0x3}], 0x18, 0x8010}], 0x5, 0x80) recvmmsg(r1, &(0x7f0000001300)=[{{&(0x7f00000005c0)=@ax25, 0xc5, &(0x7f0000000f80), 0x0, &(0x7f0000001040)=""/225, 0xe1}}, {{&(0x7f0000001140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0xfffffe8a, &(0x7f0000000580)=[{&(0x7f0000000480)=""/44}, {&(0x7f00000004c0)=""/34}, {&(0x7f0000000500)=""/121}], 0x0, &(0x7f0000000000)=""/130, 0x82}}], 0x2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) recvfrom(r1, &(0x7f00000000c0)=""/95, 0x5f, 0x0, &(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ef4bcee21c702725eca3cf894a0aed24552f8c5cceedc48acc9ad2607e2b5f15672cb3b92e704f9785080e2ee726c1f0738ede5d3f8db424b7239c35138bb2"}, 0x80) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', 'nodev\x00'}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0xfffffffffffffffd) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f00000001c0)=""/40, &(0x7f0000000140)=0x28) 01:12:53 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x8847000000000000]}}, 0x1c) [ 231.137798] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 231.145903] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 231.154516] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:12:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x7, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0xffffffffffffffbc) fcntl$getflags(r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x40000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r1, &(0x7f00000002c0)='Q)'}, 0x10) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:12:53 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)=0x0) io_destroy(r1) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) 01:12:54 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:54 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:12:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x89060000]}}, 0x1c) [ 231.337661] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 231.345640] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 231.354344] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:12:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) 01:12:54 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) [ 231.508563] device bridge_slave_1 left promiscuous mode [ 231.514245] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.568084] device bridge_slave_0 left promiscuous mode [ 231.573703] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.593720] IPVS: ftp: loaded support on port[0] = 21 [ 231.623684] team0 (unregistering): Port device team_slave_1 removed [ 231.635529] team0 (unregistering): Port device team_slave_0 removed [ 231.645795] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 231.665011] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 231.694853] bond0 (unregistering): Released all slaves [ 232.358264] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.364728] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.372643] device bridge_slave_0 entered promiscuous mode [ 232.409685] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.416260] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.424595] device bridge_slave_1 entered promiscuous mode [ 232.473612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.510928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.616890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.655713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.820082] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.828057] team0: Port device team_slave_0 added [ 232.863219] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.871049] team0: Port device team_slave_1 added [ 232.904385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.942556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.980189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.010640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.254206] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.260591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.267223] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.273577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.280784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.025085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.097418] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.169195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.175365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.182861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.232485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.262312] 8021q: adding VLAN 0 to HW filter on device team0 01:12:58 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0xc000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r0}) 01:12:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x86ddffff]}}, 0x1c) 01:12:58 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000002c0)=""/241) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) flock(r0, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:12:58 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() 01:12:58 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() 01:12:58 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:12:58 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:58 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66686c6530202f6465762f70746d7800202f6465762f70746d780020776c616e3073656c662d747275a2e36564657468312d2c9476626f786e657431656d312b287e626f786e6574315d62646576276d696d655f747970657573657220202f6465762f70746d7800202c2a776c616e30766d2d240ac3b98b13"], 0x7e) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 235.558450] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 235.566431] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 235.575080] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:12:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0xffffffff}) 01:12:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0xffffa888]}}, 0x1c) 01:12:58 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:58 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl(r1, 0x4000008912, &(0x7f00000000c0)="295ed277a4200100360070") unshare(0x400) r2 = socket(0x1e, 0x200000000000001, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x20, 0x2, 0x8, 0x2, 0x1, 0x6, 0x2, 0xffffffff, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000003c0)={r3, 0x80000001}, &(0x7f0000000400)=0x8) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x10002, 0x0) accept$netrom(r4, &(0x7f00000002c0), &(0x7f0000000300)=0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 235.753923] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. 01:12:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r0, r0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f00000000c0)={0x3, r3, 0x1}) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000000040)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r4) 01:12:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0xc0ffffff00000000]}}, 0x1c) 01:12:59 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000), 0x0) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x80000000, &(0x7f0000000140)) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) 01:12:59 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() 01:12:59 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:12:59 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) geteuid() bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:12:59 executing program 6: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:12:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x81000000]}}, 0x1c) 01:12:59 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000), 0x0) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) [ 236.425944] __ntfs_error: 2 callbacks suppressed [ 236.425955] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 236.438748] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 236.447368] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:12:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:12:59 executing program 6: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)={0xffffffffffffff9c}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000004c0)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = accept4(r2, &(0x7f0000000180)=@hci, &(0x7f0000000200)=0x80, 0x800) sched_yield() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r3, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r6 = geteuid() sendmsg$nl_generic(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000001040)={0x23b8, 0x42, 0x4, 0x70bd2c, 0x25dfdbfe, {0x5}, [@nested={0x220, 0x1, [@generic="a3a4261f2ad3bcfe2af94afa26dc8eab115c5f2b3f28158e748c2f42573e338fbd5d75c164701758a8026c32eebd461208ee2efcfa00fea0", @typed={0x8, 0x39, @uid=r4}, @generic="48fe0aa9f4be1aa5d09576ba024372db5e64e4857c79188c15d08a94a8b49956a70e93f0aa8194f59481c0070aae25638855b6fa50669284cbb195670ed23b0e6760c88e0fbb4ee6c903384a5de7210b9af303c1f3f847", @generic="8a3c40198c0849891c978e21f235e82d31e29ca1ccefb986e1e59537b51675c6ae44dc30713b7c4d50fc11aa2cca89a616f9489800db64538674b334f516a43e56000cc136448fe1278e05db66c09933ec5f61bca528705d3288180f2b2890ad3103c03ae2fb30517ddb55913fcd107c02ff8c964dec3242a92af9a5a861d8c15f7b638a4a3688265008ba51bc357e3dc42d629dc54925b67d3332a32bc82560c042f45229a3804b07bd744169f325b24eee7a46c1dfc4ffb96f873924a3da1f3405f65570c662ca95bb7b8e", @typed={0xc, 0x15, @u64=0x24d}, @generic="a390ac00296cf273664f6bfb6069b9849f669cc20edcc7e413c25f3bcec2101460e5017c9c494af20f1c88bb2430b4064abfa3cea5fae89e1db73367e7c12a4fc944b8836cc274dc2e81990cf35d6df7b335811b66f040385b6401bc5aad12111d71e2e1e05bb60a5735ea59b1695f6ec6052315aa031408f46c84b932d759d3b0ac441de1bad41b1a6163fdf00099d06663cc90ad6fdc9249db3a42b7dc32e16f5f676e0dc7dcf43a3f938526"]}, @nested={0x4c, 0x28, [@typed={0x8, 0xe, @pid=r5}, @generic="7a20646cca86e06cc80f28cd799602e450d014058111792da35b", @typed={0x8, 0x5e, @fd=r2}, @typed={0x8, 0x5d, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @typed={0x14, 0x69, @ipv6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}]}, @generic="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", @generic="b6be9f35b55ca221666c1f47d49a", @nested={0x11c, 0x25, [@generic="02dd94cb4bcb3a3da29364c33a828913ec387cb94e88d06b0aacf7b396568218af8cda0e95aa8f4ef7325f0987553d5804a4", @generic="8249c806ff4751b0ac37334d3fad451ae15c", @typed={0x8, 0x86, @uid=r6}, @generic="0a6a92ecfb87316f1c78aefa7ff48710e58680f8108be9939354ff6c74ee7fab623b80f4a2f1dd5cc23838d5f29d497f3f397254bfc7a5b5dd2b241be46067b2afed41d3078b0fcdc682006076685733f8767079c1282b877a3ebc9933b7fc1de8247b7f5def6fe10a10b044991add99dcddbd7d737f94a0366dd1d914232cb9c0830ea3cd0e881ee962462402c2e4196acbd02fa29d28b956f9c7444e30ce000fafad02da3f4355a6f9fbcdb1a78399cb23fc29ec7647abf5fed4a54a76ec42a31b6177ebb3b8e4ecc816"]}, @typed={0xc, 0x7a, @u64=0x1}, @generic="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"]}, 0x23b8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x8000000, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffffc}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) sync_file_range(r2, 0xfffffffffffffff9, 0xffffffffffffffe1, 0x7) 01:12:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000040)) r1 = semget(0x1, 0x2, 0x400) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getgroups(0x4, &(0x7f0000000340)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0x99, r2, r3, r4, r5, 0x0, 0xf836}, 0x3, 0x46000000, 0x1d}) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:12:59 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000), 0x0) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) [ 236.583318] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 236.591302] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 236.599979] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:12:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0xe00]}}, 0x1c) 01:12:59 executing program 6: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e22, 0xf607}, 0x1c) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0xa4, &(0x7f0000000300)=[@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e22, 0x101, @empty, 0x5}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e21, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e23, @loopback=0x7f000001}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x8000, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7fffffff}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x2, 0x718}, &(0x7f0000000500)=0x90) 01:12:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x11]}}, 0x1c) 01:12:59 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:12:59 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0xf0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) ioctl$int_out(r2, 0x5460, &(0x7f0000000040)) 01:13:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:00 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x74280, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000003c0)={0x0, 0x9, 0x75d, &(0x7f00000002c0)=0x3f}) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000480)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x7fff, 0x401}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0xc14d, 0x3ff, 0x20d, 0x33, 0x0, 0x9, 0xffe8, 0x401, r2}, 0x20) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='ip6_vti0\x00') r1 = fcntl$getown(r0, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f00000000c0)=0xb) ptrace$getenv(0x4201, r1, 0x3, &(0x7f0000000080)) fremovexattr(r0, &(0x7f0000000000)=@known='security.ima\x00') 01:13:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0xe00000000000000]}}, 0x1c) 01:13:00 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:00 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:00 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:13:00 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) fstat(r1, &(0x7f0000000580)) 01:13:00 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10001, 0x240000) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x7f, &(0x7f0000000100)=0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000002c0)={@mcast2={0xff, 0x2, [], 0x1}, r2}, 0x14) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x42002) getsockopt$inet6_buf(r1, 0x29, 0x71, &(0x7f00000000c0)=""/40, &(0x7f0000000040)=0x465176b97a322a3b) [ 237.753794] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 237.761810] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 237.770558] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000380)=0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 01:13:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x806]}}, 0x1c) 01:13:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xfffffffffffffffe, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfce4) 01:13:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x100000000000000]}}, 0x1c) [ 237.939082] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. 01:13:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:00 executing program 3: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) semget$private(0x0, 0x0, 0x121) fcntl$setlease(r0, 0x400, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r2 = semget$private(0x0, 0x7, 0x80) semtimedop(r2, &(0x7f00000000c0)=[{0x5, 0x80, 0x800}, {0x3, 0x81, 0x1000}, {0x2, 0xd15, 0x1000}, {0x7, 0x8001, 0x800}, {0x1, 0xaf, 0x800}, {0x2, 0x8, 0x800}, {0x0, 0x5, 0x1800}, {0x7, 0x5, 0x800}, {0x3, 0x7, 0x1800}], 0x9, &(0x7f0000000100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) 01:13:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x40) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000002c0)={0x2710, 0x0, &(0x7f0000ffb000/0x2000)=nil}) 01:13:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x1100000000000000]}}, 0x1c) 01:13:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:01 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:02 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) fstat(r1, &(0x7f0000000580)) 01:13:02 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:02 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:02 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x8, 0x80000) 01:13:02 executing program 6: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)=""/55, &(0x7f0000000300)=0x37) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) getsockopt(0xffffffffffffffff, 0x8000, 0x1, &(0x7f0000000340)=""/212, &(0x7f0000000440)=0xd4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x140) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) bind$packet(r0, &(0x7f0000000180)={0x11, 0x1e, r1, 0x1, 0x9, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}}, 0x14) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000000000080030000000100000094feffff8000000080000000070000000000ee000000000000000000"]) 01:13:02 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x11000000]}}, 0x1c) 01:13:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000004c80)='/dev/audio\x00', 0x2000, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x16, &(0x7f0000004cc0)="0c86c5b585b9c2043a7e3c033e43f2ce68e5", 0x12) set_robust_list(&(0x7f0000000100)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x9, &(0x7f00000000c0)}, 0x18) 01:13:02 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) fstat(r1, &(0x7f0000000580)) 01:13:02 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = msgget(0x1, 0x4) msgsnd(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000000000045862d512d50dffea6579e984216c7e5b2477643b22e009d20c69b19e95b4b1cc3d697c5e4a10906a6406dbab33b291a6fae8dd9781bb7167c0c70083199499867b1f78e4be3156b234ad73d093be89632082ef23d1a1f305be2f15bdc7209f68946cd9dbe76f738f62419b53d6ff95e4ba4dd9358cf6be7bb983a5dfbe3392b8df793db4221a9d48909e07a4b5bb33658fc1810f8a9fa71885525745db692ec14b3912e8c2eda5e4cff"], 0xbb, 0x800) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0xfffffffffffffd32) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x4305]}}, 0x1c) 01:13:02 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:02 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:03 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:03 executing program 6: get_mempolicy(&(0x7f0000000280), &(0x7f00000002c0), 0x1a0, &(0x7f0000fff000/0x1000)=nil, 0x3) r0 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x7fff, 0x58800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x8000}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000003c0)={r1, 0x3, 0x2}, 0x8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x20000000002e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x100000000, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:03 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:03 executing program 3: r0 = dup(0xffffffffffffff9c) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0xffffca88]}}, 0x1c) 01:13:03 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:03 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x80000) 01:13:03 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:03 executing program 6: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x800) 01:13:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) pipe(&(0x7f0000000040)) 01:13:03 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:03 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x31) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x543]}}, 0x1c) 01:13:04 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:04 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000140)=ANY=[@ANYBLOB="01000100aaaaaaaa01014f7065a872d030e9aa"]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x2) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 01:13:04 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x2000000040, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000002c0)=""/51) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:04 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:04 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x31) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:04 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:04 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x4788]}}, 0x1c) 01:13:04 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = gettid() sched_rr_get_interval(r1, &(0x7f0000000280)) 01:13:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) memfd_create(&(0x7f0000000040)='{nodev\'\x00', 0x1) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:04 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:04 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x31) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) 01:13:04 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x800000}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000640)=""/40, &(0x7f0000001000)=0x3cb) r1 = socket(0x11, 0x6, 0x4) socketpair$ax25(0x3, 0x3, 0x100000000000fd, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x0, 0x84) r3 = fcntl$getown(r2, 0x9) waitid(0x2, r3, &(0x7f0000000440), 0x2000000a, &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={r4, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x7fffffff, 0xb9a, 0x18b, 0x209, 0x2, 0x0, 0x9, 0x8, 0x0, 0x203, 0x7, 0x2c, 0x9, 0x9, 0x5]}, &(0x7f0000000400)=0x100) [ 241.601180] __ntfs_error: 20 callbacks suppressed [ 241.601190] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 241.614051] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 241.622655] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:04 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x800000000000000]}}, 0x1c) 01:13:04 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:04 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x800, 0x3, 0x90, 0x783f, 0x14caa00000000000}, 0x14) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000002c0)=""/101) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x1, 0x4}) socketpair$inet6(0xa, 0x800, 0x1, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f00000000c0)=""/40, &(0x7f0000000140)=0x28) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000200)=""/85, &(0x7f0000000280)=0x55) 01:13:04 executing program 4: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) 01:13:05 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:05 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffff9c, 0x0, 0x1, 0x1, &(0x7f0000000280)}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={0x0, r1, 0xa, 0x1}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000300)=""/40, &(0x7f00000002c0)=0x36d3af65e7dd036c) 01:13:05 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:05 executing program 4: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) [ 242.336369] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 242.344331] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 242.352956] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x4, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x4, 0x1000000000003, @loopback={0x0, 0x1}}}}, 0x75) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x400000, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000380)="a28f787b803f43dfd779d3c230f84f881b9fe80491f4eb123ee46f679b6a5dfba3fff0698a29f259558fd26fce64b85a2bc63f329057aeb22be35bbe0626a83ae5ba") getsockopt$inet6_buf(r0, 0x29, 0xda, &(0x7f0000000300)=""/40, &(0x7f0000000340)=0xffffffffffffff69) 01:13:05 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r1, &(0x7f0000000580)) 01:13:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x8906]}}, 0x1c) [ 242.400619] ntfs: (device loop5): parse_options(): Unrecognized mount option #prors. [ 242.408610] ntfs: (device loop5): parse_options(): Unrecognized mount option sá šssGfiles. [ 242.417247] ntfs: (device loop5): parse_options(): Unrecognized mount option . 01:13:05 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:05 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x0, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:05 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0xc000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r0}) 01:13:05 executing program 4: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) 01:13:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = getpid() r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x8200, 0x0) bind$ax25(r2, &(0x7f0000000300)={0x3, {"fef62c881b9159"}, 0x5}, 0x10) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000340)) sched_setscheduler(r1, 0x9, &(0x7f00000005c0)=0x80004001) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x4305000000000000]}}, 0x1c) 01:13:05 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) ptrace$getregset(0x4204, r0, 0x3, &(0x7f0000000280)={&(0x7f0000000080)=""/29, 0x1d}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x1, 0x2, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ftruncate(r2, 0x6) accept4$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x80800) 01:13:05 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) 01:13:05 executing program 5: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0xffffffffffffffff, 0x6, 0x1, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f00000004c0)=0x10) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x400, @dev={0xfe, 0x80, [], 0xd}, 0x7}, 0x1c) r2 = request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)='ppp1em0', 0xfffffffffffffffa) keyctl$invalidate(0x15, r2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x80, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f00000003c0)=0x52, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) [ 242.737754] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. 01:13:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000040)=""/40, &(0x7f0000001000)=0x156) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x200, 0x2000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x420100) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c653020212d2a7d5b0a3dd11d73c165dd603cbf490a8b5428859ef60fe9bbff030000d2c362edf5c9cb44d89ebf3a68a125aa6e4d2401c28ab881dafd3ec08cd368d40ec47553eece90381ad7f966a3f4ceca3ffec0f6f562d400000000000000000000000000000000919d3057b71f8ed5161f77430b26"], 0x71) 01:13:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x43050000]}}, 0x1c) 01:13:05 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x0, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:05 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x8000)=nil, 0x2c8f9ffa2fd6375c) shmdt(r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x111000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000380)=""/233) r4 = creat(&(0x7f00000002c0)='./file0\x00', 0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000300)={0x3, 0x1, 0x5, @empty, 'lo\x00'}) times(&(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x31) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000002c0)=""/241) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) flock(r0, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x9, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xac0e50508cb2855a) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0xce040) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1, 0x8, 0x0, 0x1, 0x1}, 0x98) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000080)=0x4) 01:13:06 executing program 6: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) connect$vsock_dgram(r0, &(0x7f0000000280)={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x88470000]}}, 0x1c) 01:13:06 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:06 executing program 5 (fault-call:2 fault-nth:0): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:06 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:06 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x0, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/52, &(0x7f00000000c0)=0x38e) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 01:13:06 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xffffffc0]}}, 0x1c) 01:13:06 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x7c, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0xfffffffffffffffd, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000580)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, r1}, 0x14) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000300)={0x6, {{0xa, 0x4e21, 0x80000000, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xe4}}, {{0xa, 0x4e23, 0x64, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffff00000000}}}, 0x108) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x80, 0x0) accept4$nfc_llcp(r2, &(0x7f0000000600), &(0x7f0000000680)=0x60, 0x800) 01:13:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:07 executing program 7: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x31) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) 01:13:07 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) 01:13:07 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r2, 0x2}, &(0x7f0000000140)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:07 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x608]}}, 0x1c) 01:13:07 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:07 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x40) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000040)={0x0, 0x2, 0x80, 0x48, 0x100000001}) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000080)={0x2, 0x0, [0xfff, 0x3, 0x0, 0x80000000, 0xfffffffffffffffa, 0x7fff, 0x8001, 0x80]}) 01:13:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) pipe(&(0x7f0000006f40)={0xffffffffffffffff, 0xffffffffffffffff}) connect$nfc_raw(r1, &(0x7f0000006f80)={0x27, 0x0, 0x2, 0x7}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x2, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:07 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8000000]}}, 0x1c) 01:13:07 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x0, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2400, 0x0) connect$netrom(r1, &(0x7f00000001c0)=@ax25={0x3, {"e8434f70d6e235"}, 0xc5d}, 0x10) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000140)={0x2, 0xe3a6}, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x338}, 0x1, 0x0, 0x0, 0x40}, 0x80) socket(0x5, 0x3, 0x8) 01:13:08 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:08 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x0, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xc0ffffff]}}, 0x1c) 01:13:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x10000, 0xa00) sendmsg$nl_netfilter(r1, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000340)={&(0x7f0000002180)=ANY=[@ANYBLOB="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"], 0x1038}, 0x1}, 0x8001) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) ioprio_get$pid(0x3, r2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x2b9) 01:13:08 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x2000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:13:08 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x40000000}, 0x8, 0x0) 01:13:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @rand_addr=0x1}], 0x20) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:08 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:08 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x0, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x400, 0x0) 01:13:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8100]}}, 0x1c) 01:13:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 01:13:08 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) 01:13:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x11, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xffff}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0xfffffef3) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x10001, 0xc000) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) 01:13:08 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) 01:13:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x6, 0x200000) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000002c0)={0x3c, @broadcast=0xffffffff, 0x4e24, 0x3, 'wlc\x00', 0x2b, 0xb09, 0x3a}, 0x2c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) socket$inet6(0xa, 0x8080f, 0xff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:09 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xe000000]}}, 0x1c) 01:13:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000001040)=""/4096, 0x1000}, &(0x7f0000000080), 0x4}, 0x20) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:09 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) 01:13:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:09 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x4000}, 0x8, 0x0) 01:13:09 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000280)={'erspan0\x00', 0x81}) ioctl(r0, 0x6, &(0x7f00000004c0)="9faeba348bb791127f8eed1cb1af192c27b68eb2f0b57c69f407a32dcd051bbba256aed109eadac3674fdc4b2d00cf4c17897c2b8b9e38dec2e29f00e12f2bd645321fb1620ef84d9b7373382cca1a9a0f8392e6e11abfd95ca0f190801141c7e6d6777a5d8a8b4ac4f5e40b720f0364d492701d39346cac2dfbf93a9339afa330ac4c1fe9254dee521f8a0ed08f5080e4727457d4ab938cc1220b79aeccd77033784f62266f00b7ef5c8789f0544284f82fe222299b6d02114c521ed32b1c56a935f828573b17") getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x80350000]}}, 0x1c) 01:13:09 executing program 3: r0 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)="72a81c22d8cd630340509715715b318d8c29c75401587a00f374d3af42dd6c4f658ab5f198cf41", 0x27, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="acc9e97653a519b540c20218803c1ca11d76c064077c25d1766de8023716992aa51662b4cc93474e812c1f505316011fd81dfaf2c840fb81ccad7f60eb6d4ac5de5eb62849cd52de32abd0e5e1d1004f115131974405089b12", 0x59, 0xfffffffffffffff9) keyctl$unlink(0x9, r0, r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffccc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000040)={'team0\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) [ 246.794810] __ntfs_error: 26 callbacks suppressed [ 246.794820] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 246.807673] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 246.816317] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:09 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) 01:13:09 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 246.981773] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 246.989778] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 246.998394] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) write(r0, &(0x7f0000000040)="fbf500a81c0d56969edf9b5936d4efb41d0eb3414477a5817585ec2fc17e68f1be66a501b3fc3d3d56e9e312df473da2488cc10ea6a9025da6650bac72bd612c61bfec7af36c729f967161f540eab6", 0x4f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x8180, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x6182, 0x0, 0xd, 0x1, "0db78e2595bc03ec6c2ffabe33bf72ffe0ecfa70d4315e932916b08e13e71a459e4bd31352ff3899f2d73e9ddc9b109253361acb46eaa260559dbffca6a15bb4", "a816b3e92227464d63fbcea56a37f4a725b95b15d1b15b7cdaed024c4f4a18d4", [0x344, 0x769cfab7]}) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000140)={r3, 0x1}) 01:13:10 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) 01:13:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x806]}}, 0x1c) 01:13:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f0000000280)=""/21, &(0x7f00000002c0)=0x15) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xc0040, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x1ff, 0x8000000000, 0x40}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000400)={r3, 0xf487}, 0x8) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000340)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x2e, &(0x7f0000000440)=""/40, &(0x7f0000001000)=0x72bcffc4) 01:13:10 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:10 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:10 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x3f00}, 0x8, 0x0) 01:13:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = memfd_create(&(0x7f0000000300)='/dev/admmidi#\x00', 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0xc5d, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f00000002c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0xfffffffffffffed6) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000001040)="19ced7869f49b6c5c1f8c2bd850f34ffb493304c9f471d14e4fa8ab4a84b1a2b0cf3183b01eb3ba7f23ec7ae05a7dd9b6f05b557d50e3afc51586a417ff96646f988b766316e3b93a33c58a47e3be4cd48d395c8c97e6d96a053bd288535ac1e8ecd8585626a8c08c50091da38afe18d334077fcbecfcc15d31b722c8d6647e3afcb3423f53493aa8587a5f7f538f5bf078eeb73bedfeac0c8853c18bf13d176e485d2005df997009cdd4d73e417aa6928f8909fb5b6c9ad156f5544030e65b16d57e6f0943fd08b98e052a02a8db574428d2f8f123e4e664a79d45412c9dac6eca961d29f1766d3a48be627ee48067198ef6fbfbf63ee98b105572b5eccb1be0dfd4ada1a170669dcba7e418ae2e8e68ed9a7332691d937d603c0a993fd89918a40ddf44183538f24e85e5e4719695360799f4536fa26cfe0a2e2f85b51c7c7c1bcf407775f1d0a8ba1d84eb4f3513af28d1579893de8e95f7aac8c1ccd9d0b3d488a852550075deae3d7b5586758d6b9fbcf97d1b4885f34e1573a0f31d839c94a6881102ef731cd3c473e0127740b32eae3b224cb20308168c94b05441fd175a1acb10c910c4b9c0654bc35b48de77e4d338b9330234bd10ba2a0e0c8db71c0c7f94440fc3665d2793f79f1595e3753eb3230db33818e45a78dc798ed1025e867faddce9a88502c3892d93e1e6d8d9806c1a2a82074bbd47a9f470c663e9c3359912c78ee2389275659ab5b848277937d049c8ef500cc8f552e7d450d70faad29e44355bed6375088bfdab250fe582ff58f190fe7280f29344d2a392d131fe45e566334ee7c0050c6cd8ff8b850ccc4006397d5b471bdeebea82951b9686a09c913b4c23f03aae12237329b50cd519e6d942acc4265ec5875978001729365c9d136d0820d5c7b9efb905ce2edcc473e7fa23d904b2a4889387dc738676e6e93ea5115215f5fc46dd90c4787ea1168a50b69762f7a27ad9f5a2fd9f1e2d21bb403d395f62039e94c62e5db50c1560fb237c4b8140c120a8145a6ccdf383c0e03870e27656fdd0616ea9e83008ead18b3d3dbb9bdb95a50d5695151ec0f9451126a071e9c3f20119922ed835fb7cf6694c4f846e3419c38f97c9b5dbac135f0ce796d98dc5e8199ade2f6590bfa81b287dcb8f782a42521b125dcd2a38d17ea0191c82e3075bacc9a105b3b72409fac0f541d15c723862d05a7f12b5ba9775dca0edb7eaedc1d4d776d00330c3aa0f743b0fd39469c77daada1cbcb2f25e257917c62d6ae1fd289d4b6d3df996ac6f4de69176dcba8dc3c1d81f4ebaea9b48e043287199cae55b6e9628631bb8aa260fba863da520a49be3e1a66291524f54fb02f908ec737d711907710874149b88b17849aa44a7e806dcaa39df50c28fa205a1ab9d4e60b3edf47c983a8f354436ef9e63a32f3869f5f6fdf36a4c81f5f22b96084e84aca05f7562a2586057af6139e45f59a4fc08bf11c3cc2cd4c3b298f2e8d0938421aa76eb238f68cb618f989db00aa49cb5dedc6413aa98f471b1f6a1a82ba86910af5525943fe1bf1111aaff1c334704fa4318e46395868a2b1dcd305a0809604eaadad845f534db0de200adbceaa6974afa9ada3a6eb45407c344d2028f453f81dd4c8626d7c7e1b2d7d124d219571bdd62efcbe22e00d0dad8aaa5234cc4b5b48a92c02ea10eca4fe75788f67ca5dcd0d6b4375928bd8eb23f5ac2a0f5d261a56b42ae1764c017ae27694bd455a5cd12d23308628f711fad5af825d4e551cb2a6fa1e695a007fe2d96f39a0fc584a1f1154c818c490bc1061c2d7584afb5b92524a0d397c27bd8fd987042d23d7b4627177a45286041668d895ab1671dbebbb88a9d7540218128fa34adcc7f2451d45552428b35804d6c4f327fc11e9280fb8a96403b0e0beaa1df434d33df53b773fec5bcabbaa94eb2a86622c1af8e1d0b06fb5cbb134bdb72071187097fee663d7a023a62a1fbc0d0ee6ceef84496787c8f549568f99fff63fc22ebc29d81f76f71d3e85ee3f3f200b33187fa41550c6e778a2c80c195e524eac5a99ff704a946ee175aed4f4166c951b5c40866ae67939eb5be3b175c597128b1a385d2748a3c2913062ccac417b265d3907101f1b087ca4b7f8e65a07917cc1c98dec74bb21c58fe317a05d46ae289767736c2715f4f875c73d2b9ff64b46b2c2be80bc244e65db1089279fa53ce184293834bdb19eeb3a83081b620d45602164ad30b016256a3bf6737bf1f8253a8ac3a4f780c72b2983346bf13700f82b086220e34b1c1b965808d4e3e68586ca7d16ee33c2dd854145e4b1f5e0319a6521990172109331903c61d207730109f24a0146fda137297d7e0fd5de21ac7326086fa9f02e9233e5b6bc8a91392847125f2d483ee45fb081ec6f98c9ed5a313225e30942d8869f6b1907e902648200042a7f5f3a7f064f7e1b8ffa0e2741c64ab626380e31d45a29e298ff899cba061447d93a61517a41c1975a92cf492a5da9a46f8729a690d9deaaa0751ac768153e076c1bc1b8bf17696fbce502b049ebad9e0ff6db3785e30264b93dd0b777e16e3b5eeccddde23fa41a06f20073a1201e5718e67e8f1a83cb0f6a0a311373081a0fa3c1fb85cdc9cb64595fce7b70dbfeaac464a14fcbe73c7d4c4d3082f3105aede0bb6bdea7af6de06541500aa31460528143110b763ff7b9e93637f9f79973fbcdaf734efc4eba3914b5d5208591ad3d26c83943bf7c7ea2a7c22de3f771674d048193183e4bdd49ba6c6b4fe3463b46336a3e7a5b9e9ddcb72a435ed885b79452fd0124a8370e21e4b81dbf1ca2711c9b175e20e2ddf0a1c2b919ca3550ad18a6aa8176b89d50723827988992fac94203021280c8725eff1d49d20f6a3591c123139c796c78518173ad8f781ab6c198a06b8c0c4c2ef8df1d90da181ddf060ade9661c2b0becf5e476ab2954e896c8874bb141681a5d1d47cd39e42efc87d585f29059a9796278208506439a4f0cae49d8f36b7a69358ae7cf9bc15299873661e308bb744c35d04bb77ec26ce39c31cac60778f2d0d8a7e6a8ce1f6468599898ab601c3a962797ac20498453e58bbd7a8fd608a736789b0ad8fa6ce45c01b71e11e49006ee900b30e98f92edc2279c96ee8cdaf34d4a3e51e9d53f0d6aec35234672d1c009de4818eac0b74f93da75096c50d9555387470f4ec2b1fc90eed726299b9954a5f5cff76a0dac63e5c581dc296d914a99d530cfdca60c1d0a45af68b42e77131495fce98e6362d409c5b74cb66eb2319d791586a751211791ee041f8dbea925bcb4a88d92cb81bdf68952d42ecc8351cd9a0675dd1076c9b63d045c3d50d8e57423c2b674c1dc99f996cede088cf96737641c8f82317cc4ee3f736005f48f5ce100214947eaa0601d736835dfa68119a462816418b2e63073c742209793d5acfd12891706a00821665ddb17009451b467572e484f3180c4e59685e99a4832e533ecbe3107c0a16aa436bdfd5826d14e8ab664d003e1bed3f36105985d9c7745ea2b508276ea7f605360045954572a35cf857cdb7c6a6020e6c397400091309e310728825ca0db1b0764c133b9bdc7812c90203c2a484d237a5aa5d9e55af175f86e70e79681944070ceb8d60cabc4210ce2616f9db440eb3f731ad71cd8a945b28f8761088352eb4ea3a7c5956fbcd704c6d0c41f3f6ed6b8c813bd7c46280d36d4cd98ff65a9a6664a5d448d555d501b64259743a5b87ff315b90017d023b0ec5f7b475879c31830f7c98a18c6b9524c6ef20a56e96c8e507e11519bebc18cf69a56f81f3207ded73c5e9de1d90bfffa0a6a4650facf04a94be3cda75a3ddb26df87b34e92cbcfc183e05eecf5b2ac2abed48ddcd9234af1daa8a106139b2d845b022c4ec64e9260253bcb9fd69f482e9211f950864ee7c9ec08bfb97081c06d67219d2500ce45bc943e172619386706cc01f17cb985272cce82d31849c4a61137d109cbcd360f4b06f18456b05e3ec036c05abcc59eff2cb5e20f48de6bde0f44fb5c304503e4c5a47c7727f62e0cdcf98ed633ca7fe3da15d9c1512ec462ccd4be3ac1cb9344ac4a943d2b0d90c1e277949a3f0b72b3fc15a31162f47871f6084db40ab679b235aa526f6eda01b13a01d622a8799154f635174738c1fc7616e4ec84c5d8a76307b352401e1f4d9f270d102408860bce0bdb989beebace7013bcc0df082d84c89b6829ec4a90b1653f335f19e4cb67a9ff44e3e6437c5293ac4c082c688d3930ce6a007857872d4f9005cf1adf3506c269b245d36f75738c5aa7b9289968b7b54594f309441b34f9279baf70cea5c5a3ec328dd86f58fe7c53c50d19c22e24396ddabbdb09f9884f6c8607d4eb7a91296050af4f10ce06486a20c937453c35e26f310f465673142b537c2077b69075faa85cf48d1858845f03f57bdb770ed587589b59838f18bff0f2fd00e8831eef0d9f421479982c838920635f2b2bd34bf372a4ebbfbd372585546777eb785b91b93550816f38181fc430b162eea5fb64e0089e0aacb6f598f13ce7a90bc434bf502b1b70ce96462c7463e4a60f89b23c7218692025f14c1ae9d449541474b0ad77de446831bc7e51adb4ba8ab783a7e398a1c8cf0cacfcde9f029e565f05d50b99bedfbbac64191423e9e70dde5ce703de0ec84037ac6b656d86c4fe0a13687d51012962aa5371e65bd8af4eee139a759737cc817ace11f5193b2842d9e2e5792604068bc1eea5170caa6ea256ab3a1d014eac2c4f25b01634da7c1a29cd8423ffce67e0c8b6e83381828519457884e6229ee6741a9650cf9b2b15f6f8950c260245db7e71dd43ced128c3f6dca5c91e3a1490c67b39e66b43cfe0be1bf0bad278a954a4349e190524ca5fb3a8207c30675db1c7a9556624ecbdbf97a6b925ef3ef5d26f5bdb8b5865c5fb227ad757795b9acf58abcc27081efc087ee51b0c662887bb7a831a69be10e221fd6ecafe72d32220b3d70bce2f8baf9add3331150cd9ddb90007ce9972e573ff232c37ad38034d012fd9bba1b83b210a0b166468b51fb997543ef27aeb892a5793f637a82118c92b15ad4b14e7159f37c923b97b3474ec2bb2c4e720a591653354bb571c163780047ed3591bf4a7126989819bb1fc76b3947f8bc4993c70ec9394b38275496994c17124d3ebe16b1d2205e7fb4e38d2551cbed37394cd1360283fb916b93583ed01a6786b55932b5730a8d25746e28e8ac3dfe749403ec56489280348269d41a9b89b0ab7b24458a0fac77a48a676e8b4523ee001e9b528e2398b0ea58ead37da5f65ee749b7c5b52d6d3a589b665189dbf48e0c84fb038724b33aac8670fd8dd737b37ba3fef02885a0d65ca6ca7b833a39ffbef2b82504d1289832e95f50577d865c6fd679aafcd2d0af750e70d532ecdcfb62fe8262c1fd70994c890dacd78d9bd457b0d54cfd28e6c08b6d52fff6d315cd22b9cc2abc029ef4cdb9d13d63dab385fc1b5bfb83fcb925a8062a5c5174ba0e2fc6d3fde9e1037d6689f800b3f03cc2bf73a06c335daadb81c0fd64a82f76bd496ba47ba1a5c10197260d560aee6978ce568ae084bb302129e8fdf399a68c3952d82624d9a0997541c6448312aa712f5975f7509418ea2f5876c166bb99a7141f2fb33c6ddba403fff3ed905cf386cc530d184e04ee922100adb90e30348c13332436ca52f49b3896ea7f079a9642a72d723937019305724559adfb92d81b80940bf64b9523c023de1fac3f569fb5cf5520418400fd4c932a90dd4fae7e73441425", 0x1000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x90000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={0x0, 0x4e4d}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000400)={r4, 0x401}, &(0x7f0000000440)=0x8) [ 247.877731] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 247.885698] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 247.894328] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:10 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) 01:13:10 executing program 3: io_setup(0x7, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = eventfd(0x2) r3 = socket$alg(0x26, 0x5, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x100, 0x800) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2b12a37c5311fb91, 0x5, r1, &(0x7f0000000080)="adcdede582909ad8f6710f1f8ec748e80a279a95717b183f369e4b059495f5ab94418ed2b72699970be2e102b1be538e3be43ef2d936f37d490e225420f2e56ffe51977ab04fee3191674b23528955b69817fcfe6b72c3a131e634fd58d4a5de67967e09a6819199fefa1eac29d6cc96211506f732c88c96fb618c8cbd76cdc2abf3e15bb884cc576d6650e14acc43ef3ac06c47cfef5ba43cb8db3c1b9e184bc78725af7b775e27a328928da961942992da19a2931216989b56536b452b6d8bf55e5775eb3aa7826a04184565ce3f71cdf62f", 0xd3, 0x5c21, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7ff, r3, &(0x7f00000001c0)="f1738197f0ab07e3606e0e3ae4c88cb56181d891a448057ba834dedb48df540332e0c4598bcb2d9eba346cac90c7c2129ed7b59fea77fb0a925f0deb0facc922b31c994027f03798509defe771b82ea6f745a6be8d86c7d69677d29ec0d0ff6b6fb5943245648860a97238c9785e3aa1b3fe84afd790375bff39b08bda54df3507417e14f266904cbf482d8b62ffbd691e2fb0b32cbb31d550913ea0c4517875bf93390dd8e0a1eb7be67ed3126626792d65ce93ef7d849ecd14d221d77205fa5a2afc3396e94b26ce593663fb86cfd636ae32de83b53e", 0xd7, 0x7, 0x0, 0x0, r4}]) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_buf(r5, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xffffa888]}}, 0x1c) 01:13:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:10 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:10 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) 01:13:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x34000]}}, 0x1c) 01:13:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x105040) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0x6, 0x100, 0x4, 0xd772}, 0x14) [ 248.096542] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. 01:13:10 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40000, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000002c0), 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa}}, {{0xa, 0x0, 0x1, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:11 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:11 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) 01:13:11 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x82800, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000100)={0x1, 0x3}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) socketpair(0xb, 0x0, 0x10001, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000080)=""/16) 01:13:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x40030000000000]}}, 0x1c) 01:13:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={r0}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0xffff, 0x8000, 0x65bcd909, 0x0, 0xfb, 0x4, 0x647, 0x0}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x1}, 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000400)={r2, 0x1}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000003c0)={r2, 0x80}, 0x8) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f0000000380)=0x1, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 01:13:11 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:11 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:11 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x100000000000000}, 0x8, 0x0) 01:13:11 executing program 6: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x4, 0x24000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000002c0)={0xba0f, {{0xa, 0x4e24, 0x10000, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}, {{0xa, 0x4e22, 0x8000, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}}, 0x108) 01:13:11 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:11 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) 01:13:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0xbd, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) ftruncate(r0, 0x5a) 01:13:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8906000000000000]}}, 0x1c) 01:13:11 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) 01:13:12 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0x6, 0xcf12, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000280)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10400, 0x0) socket$inet6(0xa, 0xac07f08f7decefaf, 0x9) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000100)={r0, r0, 0x6, 0x7, &(0x7f00000000c0)="7f95cf11d1983ccf96b5c8edd55843ac7c68a0e019878cf428f651421322f3647b4c69f2b99863cca9946b1072b445c065", 0x3d, 0xfffffffffffff800, 0xffffffffffff8000, 0x3, 0x6, 0x3, 0xfffffffffffff11c, "ca52a818dc25e96efe687f840d4cc67ba4918b8f5532747c64b8255a7e19e8eba5b0817ce01d50c7005b84eed1c5bf4373861f8d63a9cc0412511aa804e0e844e4e876b8e77a435b6e3e2ec4b6963811f03787cae774874d550c964e84193f25785140ec8d466d7edfa88470caa136d26f03ad84153e0d27271f6d8d6f921f9af6e8b72d5e96de9ee3cfbf2368df74502d8d69ec8f36f5caf8fbd039035905449d57729b8d5d506137aa727df8226b05e15cdb9d79fbf7f30ab28597c17f6e450048d492f43757bd7f1521c80a081a5ce18fd36a20f0de4b275cd7c71380d6509de5c346846029d97b83d95ce87f7cada8f73c"}) 01:13:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hci(r1, 0x400448eb, &(0x7f0000000280)="ecdfaeecbd479ceaafeec3889d0e0c794eee9f3c296141a0f91c63a019596f62c4a9e6e45411b58a298ff560f859e60ad18fd149c5398a014ca0af149080640a82a9130c8b879f9d6b85edecf0b2308cd7d3c387f18825122508ee2c3381f3a96ac36cb1b615e9613d30a8f5aff5bf5cff459a579cd7ea2b0b47e1c3063f78bd3abbade4a524958e81b9117ec3953c069faf7f3c9893d9c4481ee3f558f0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x8000, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x7ffffe, 0xffffffffffffff80, @remote={0xfe, 0x80, [], 0xbb}, 0x20000}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)=0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x101400, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0)={0x5, 0x9, 0x4, 0x10000}, 0x8) r3 = socket$inet6(0xa, 0x802, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r4 = socket$inet(0x10, 0x3, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000440)={0x74, 0x0, [0x4, 0x200, 0x40]}) sendmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:12 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x11d) 01:13:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:12 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f47767") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:12 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x3f00000000000000}, 0x8, 0x0) 01:13:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8035000000000000]}}, 0x1c) 01:13:12 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:12 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x11d) 01:13:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280), 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xf45}}, {{0xa, 0x0, 0x5, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:12 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f47767") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:12 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280)={0x7, 0x4, 0xffffffffffff8001, 0x8, 0xb17, 0x180000, 0x2cc, 0xfffffffffffffffd, 0x8001, 0x571dd841, 0x24e4}, 0xb) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0xc00) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x440, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x9}, &(0x7f0000000140)=0xc) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000001040)="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", 0x1000, 0x4004000, &(0x7f0000000200)={0xa, 0x4e23, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x94}, 0x1c) getsockopt$inet6_buf(r3, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x8, 0x6}, &(0x7f00000001c0)=0x8) 01:13:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88caffff00000000]}}, 0x1c) 01:13:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:12 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:12 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x11d) 01:13:12 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f47767") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2, 0x14f8174540d8aed2) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000300)={0x8, &(0x7f00000002c0)=[{0x3, 0x9, 0x200, 0xa0000}, {0x100000000, 0x1000, 0x40, 0x2}, {0x2, 0x81, 0xe495, 0xfff}, {0x7, 0x995, 0x8, 0x9}, {0x0, 0x1ff, 0x9, 0x9}, {0x8, 0x2, 0x2, 0xad}, {0xffffffff, 0x8bb1, 0x2, 0x5}, {0xfd03, 0x2000000000000000, 0x5, 0xcdf1}]}, 0x10) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0x28) 01:13:13 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14c) 01:13:13 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x1100000000000000]}}, 0x1c) 01:13:13 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) 01:13:13 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f4776710") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) getsockopt$inet6_opts(0xffffffffffffff9c, 0x29, 0x36, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4080, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffe01}, @in6={0xa, 0x4e21, 0x2, @mcast2={0xff, 0x2, [], 0x1}}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, @in6={0xa, 0x4e22, 0xc75, @ipv4={[], [0xff, 0xff], @rand_addr}, 0x83b2}, @in6={0xa, 0x4e24, 0x2, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x3}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @multicast2=0xe0000002}], 0xa0) 01:13:13 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x4000000000000000}, 0x8, 0x0) 01:13:13 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14c) 01:13:13 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14c) 01:13:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) accept4$bt_l2cap(r1, &(0x7f00000002c0), &(0x7f0000000300)=0xe, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r2 = add_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="9063c52d8557403f9c19f49b34d89b606bf3726e2a739bf24b02927ddf201ed6dc686cc2b762b005b2bbdede02075f13a9ba6ad3c88a3a6e6618807351063baa6d4be84d0d74126dbb472a", 0x4b, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) 01:13:13 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) sendto$inet6(r0, &(0x7f0000001040)="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", 0x1000, 0x4000800, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x40, 0x1, 0x4, 0x0, 0x0, [{r0, 0x0, 0x800}, {r0, 0x0, 0x3}, {r0, 0x0, 0x1d09}, {r0, 0x0, 0x2}]}) 01:13:13 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8100000000000000]}}, 0x1c) 01:13:13 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac64d94d65ee8631a0fdc419d3449d3f70b1522178ec5ffdf42ba0eb293a11ea563bd988aa92e3dc53aba0bb53c67b02beebbcf68ff5beb9c00ceb65d30444a9c58ebeeb7535d2fe2c1cb54f02da69b30c35ccf1b2daa33d65322651b1"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:13 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f4776710") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:14 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x164) 01:13:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x5, 0x30, 0x3, 0x9}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={r2, 0xc9, "89f0eebec6bede6e28ab352c3e699af6f01a569fdceaf26a9a1afb5157bf3dac0e5623a5617701997e9e41d187ce6e8deafcda73486ba4d03b65e2043406a5c99f212264855cd49bc08adaf1b07372e4667904011c42795e3db1a4c385e04a4cc85addf521ebcf825883ddd3feecc154bf35c455540cc0a57d0b6cc1f895ac575e8f750c2d78a8743ebbb967fc2a79253ee21a3b89f65d5294812f01419880b671f8008b85cbf465af7c9ae937a222cb9068082d77cca8ddeac53a3420cfb26d6780409c4b4fb4bb44"}, &(0x7f0000000200)=0xd1) 01:13:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4788]}}, 0x1c) 01:13:14 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/131, 0x83}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000400)}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/253, 0xfd}, {&(0x7f0000000540)=""/42, 0x2a}, {&(0x7f0000000580)=""/158, 0x9e}], 0x7, 0x0) 01:13:14 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xf0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:14 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x1000000}, 0x8, 0x0) 01:13:14 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f4776710") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:14 executing program 6: 01:13:14 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14d) [ 252.162454] __ntfs_error: 23 callbacks suppressed [ 252.162463] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 252.175314] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 252.183937] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:14 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[]) 01:13:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4305000000000000]}}, 0x1c) 01:13:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 01:13:14 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:15 executing program 6: [ 252.335512] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800000000080102, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000200)={0x5, 0xffffffffffffff00, 0x6, 0x7f, 0x9, 0x3f}) getsockopt$inet6_buf(r0, 0x29, 0xc, &(0x7f0000000000)=""/40, &(0x7f0000000280)=0xfffffffffffffeee) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x600201) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000180)={@empty, @dev}, &(0x7f00000001c0)=0x8) 01:13:15 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14d) 01:13:15 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x81000000]}}, 0x1c) 01:13:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:15 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[]) 01:13:15 executing program 6: 01:13:15 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0x28) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x2) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 01:13:15 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:15 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080)={0x3f000000}, 0x8, 0x0) 01:13:16 executing program 6: [ 253.304861] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:16 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0xe8fb1bb71324269e) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:16 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x14d) 01:13:16 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[]) 01:13:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) geteuid() fstat(r0, &(0x7f0000000580)) [ 253.476629] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:17 executing program 6: 01:13:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x806000000000000]}}, 0x1c) 01:13:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) tkill(r1, 0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:17 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:17 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x136) 01:13:17 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) 01:13:17 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x20000088, 0x0) 01:13:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:17 executing program 6: [ 254.337618] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) kcmp(r1, r2, 0x7, r0, r0) syz_mount_image$cifs(&(0x7f0000000100)='cifs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="f21b6db26ffdb82d3b274c8c6c9684317abe827dbe97e269aecdba7acb2d8400b94acac4e5b0db989e09c85cdd507017725530190ba8564f3211bcc62b13055e31f8df911d1fd43a922f1477d076d30d4ef7b43864297572a73012703e7f85f6cc6595faef1e3bcc88838729d573fc42c49198fdd62641cc2c3893b192507d9c46847d3eeaabf251eb87d6c150e27391327a76adc419a203fbe370c1a7823b625fb2044c22692f0c683c2b30f997a5f29ae02a0c833ddc3f5214889d92307d945b6323c09b2dd801ba68a49de85e81b413058496072a8553e029f1", 0xdb, 0x2}, {&(0x7f0000000280)="2a45da8f78e5274c39bdfc7d646a69015ae3b0e075a87078824f346be4a0fcd912237c1756ba3c39d5180555d50cfd1dc1441514990076b8dc0b47433d88667582c97e4ea61e278c0ca4c51845a85a053ddd723262577403152f6ab25a6ef8fbc7f59e3b92a79c3a69bdce56b5652a76700a5536f12238e3c3257798b3850ec4d09580babfd2640e02569beb0c52c1f8085b57", 0x93, 0xa6}], 0x1000002, &(0x7f0000000380)='*/#eth0]\x00') getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:17 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x136) 01:13:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:17 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) 01:13:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8060000]}}, 0x1c) 01:13:17 executing program 6: 01:13:17 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:17 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f7504ac"], 0x11f) [ 254.575485] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x3580]}}, 0x1c) 01:13:17 executing program 6: 01:13:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) eventfd(0x4) 01:13:18 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) 01:13:18 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000"], 0x108) 01:13:18 executing program 6: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='../file0\x00', &(0x7f0000000300)='minix\x00', 0x1800, &(0x7f0000000340)) 01:13:18 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:18 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x3f00) 01:13:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x100000000000000]}}, 0x1c) [ 255.437706] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:13:18 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000100)="550000001e007f5300fe01b2a4a280930a06000000a8430891000000080009000a000c0000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d40000000000000000000000000000", 0x55}], 0x1, &(0x7f0000000300)}, 0x0) 01:13:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x86ddffff00000000]}}, 0x1c) 01:13:18 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:18 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098"], 0xf1) 01:13:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) accept$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000080)=0x1c) 01:13:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x11d) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:18 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a73"]) 01:13:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x181080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e21, @rand_addr=0x5}}, 0x8821, 0xffffffff, 0x6, 0x4, 0x7}, &(0x7f0000000380)=0x98) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x40020000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x4, 0x3}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r4, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 255.604169] netlink: 49 bytes leftover after parsing attributes in process `syz-executor6'. [ 255.632290] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. 01:13:18 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a73"]) 01:13:18 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8848000000000000]}}, 0x1c) 01:13:18 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098"], 0xf1) 01:13:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) geteuid() fstat(r0, &(0x7f0000000580)) [ 255.685937] netlink: 49 bytes leftover after parsing attributes in process `syz-executor6'. 01:13:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffcf3) 01:13:19 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a73"]) 01:13:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:19 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e3917"], 0xda) 01:13:19 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:19 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x4000) 01:13:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x400000000000000]}}, 0x1c) 01:13:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:20 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x20, 0x200100) socketpair$ax25(0x3, 0x3, 0xcb, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:20 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a"]) 01:13:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x89060000]}}, 0x1c) 01:13:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:20 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x3f00000000000000) 01:13:20 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584"], 0xbe) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:20 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e3917"], 0xda) [ 257.502720] __ntfs_error: 5 callbacks suppressed [ 257.502729] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 257.515495] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. 01:13:20 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e3917"], 0xda) 01:13:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff070000"], 0x61) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:20 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb0000000000000000000000000098e9bc1e7feb000000000000000000000000000000000000abf1d71e14ad8cdb9b9bf919ed42bdf20116351f75"], 0x11d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8847]}}, 0x1c) 01:13:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = gettid() capset(&(0x7f0000000040)={0x39980732, r1}, &(0x7f0000000080)={0x8, 0x2, 0x1f, 0x0, 0x20}) 01:13:20 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a"]) 01:13:20 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000"], 0xe6) 01:13:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x200080, 0x0) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) 01:13:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff070000"], 0x61) geteuid() fstat(r0, &(0x7f0000000580)) [ 257.742275] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 257.750307] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. 01:13:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8035]}}, 0x1c) 01:13:21 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a"]) 01:13:21 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000"], 0xe6) 01:13:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff070000"], 0x61) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:21 executing program 3: inotify_init1(0x800) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:21 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:21 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x4000000000000000) 01:13:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002a00)=[{{&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/24, 0x18}, {&(0x7f00000001c0)=""/26, 0x1a}], 0x2, &(0x7f0000000240)=""/125, 0x7d, 0x9}}, {{&(0x7f00000002c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000340)=""/30, 0x1e}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/179, 0xb3}, {&(0x7f0000000500)=""/133, 0x85}, {&(0x7f00000005c0)=""/2, 0x2}, {&(0x7f0000000600)=""/44, 0x2c}], 0x7, &(0x7f00000006c0)=""/231, 0xe7, 0x1ff}, 0xb03}, {{&(0x7f00000007c0)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/34, 0x22}, {&(0x7f0000000880)=""/105, 0x69}], 0x2, &(0x7f0000000940)=""/188, 0xbc, 0x2}, 0x5}, {{&(0x7f0000000a00)=@ipx, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000a80)=""/8, 0x8}], 0x1, 0x0, 0x0, 0x40}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000b00)=""/124, 0x7c}, {&(0x7f0000000b80)=""/145, 0x91}], 0x2, &(0x7f0000000c80)=""/151, 0x97, 0x20}, 0x2}, {{&(0x7f0000000d40)=@ax25, 0x80, &(0x7f0000002200)=[{&(0x7f0000000dc0)=""/188, 0xbc}, {&(0x7f0000000e80)=""/196, 0xc4}, {&(0x7f0000000f80)=""/83, 0x53}, {&(0x7f0000002040)=""/159, 0x9f}, {&(0x7f0000002100)=""/21, 0x15}, {&(0x7f0000002140)=""/73, 0x49}, {&(0x7f00000021c0)=""/19, 0x13}], 0x7, &(0x7f0000002280)=""/99, 0x63, 0x4}, 0x5}, {{&(0x7f0000002300)=@ax25, 0x80, &(0x7f0000002880)=[{&(0x7f0000002380)=""/217, 0xd9}, {&(0x7f0000002480)=""/133, 0x85}, {&(0x7f0000002540)=""/87, 0x57}, {&(0x7f00000025c0)=""/121, 0x79}, {&(0x7f0000002640)=""/217, 0xd9}, {&(0x7f0000002740)=""/109, 0x6d}, {&(0x7f00000027c0)=""/103, 0x67}, {&(0x7f0000002840)=""/33, 0x21}], 0x8, &(0x7f0000002900)=""/239, 0xef, 0x8}}], 0x7, 0x100, &(0x7f0000002bc0)={0x77359400}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002c00)={0x0, @local, @dev}, &(0x7f0000002c40)=0xc) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) gettid() iopl(0x5) [ 258.583760] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 258.591764] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. 01:13:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b87"], 0x90) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:21 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000"], 0xe6) 01:13:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xe]}}, 0x1c) 01:13:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:21 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e"]) 01:13:21 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000"], 0xec) [ 258.820876] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 258.828880] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. 01:13:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b87"], 0x90) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x543]}}, 0x1c) 01:13:22 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e"]) 01:13:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:22 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000"], 0xec) 01:13:22 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x400) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000080)=0x3ff) 01:13:22 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x100000000000000) 01:13:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b87"], 0x90) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:22 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000"], 0xec) [ 259.634384] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 259.642397] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. 01:13:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xc0ffffff00000000]}}, 0x1c) 01:13:22 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e"]) 01:13:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x5b, 0x4) r1 = socket(0x0, 0x0, 0x2) accept4$nfc_llcp(r1, &(0x7f00000003c0), &(0x7f0000000440)=0x60, 0x800) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$ax25_buf(r2, 0x101, 0x19, &(0x7f0000000340)=""/54, &(0x7f0000000380)=0x36) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000200)='./file0\x00', r3, &(0x7f0000000240)='./file0\x00') r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) getsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000001c0)=0x8, 0x4) 01:13:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f58"], 0xa8) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:22 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:22 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f"]) 01:13:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x400300]}}, 0x1c) 01:13:23 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f58"], 0xa8) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:23 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f"]) 01:13:23 executing program 3: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@remote, 0x0}, &(0x7f0000000100)=0x14) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) accept4$inet6(r0, 0x0, &(0x7f0000000080), 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 01:13:23 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:23 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x1000000) 01:13:23 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff070000"], 0x61) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:23 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f"]) 01:13:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f58"], 0xa8) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:23 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000040)={@rand_addr=0x8, @multicast2=0xe0000002, @broadcast=0xffffffff}, 0xc) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)) 01:13:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8848]}}, 0x1c) 01:13:23 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:23 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb00000000000000000000000000"], 0xf0) 01:13:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8"], 0xb4) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:24 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c"]) 01:13:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88480000]}}, 0x1c) 01:13:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:24 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff070000"], 0x61) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:24 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x3f000000) 01:13:24 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:24 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c"]) 01:13:24 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8"], 0xb4) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4000000]}}, 0x1c) 01:13:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8"], 0xb4) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:25 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639d43e391754dbca32055a64a3eb000000000000000000000000"], 0xef) 01:13:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x86ddffff]}}, 0x1c) 01:13:25 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c"]) 01:13:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9a"], 0xba) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:25 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x40000000) 01:13:25 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c"], 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 262.840741] FAT-fs (loop6): bogus number of reserved sectors [ 262.846973] FAT-fs (loop6): Can't find a valid FAT filesystem [ 262.859545] __ntfs_error: 14 callbacks suppressed [ 262.859555] ntfs: (device loop1): parse_options(): Unrecognized mount option #prors. [ 262.872400] ntfs: (device loop1): parse_options(): Unrecognized mount option sá šssGfiles. [ 262.881034] ntfs: (device loop1): parse_options(): Unrecognized mount option . 01:13:25 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x54, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x2000000020004, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 01:13:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9a"], 0xba) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xffffca88]}}, 0x1c) 01:13:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9a"], 0xba) geteuid() fstat(r0, &(0x7f0000000580)) [ 263.129433] FAT-fs (loop6): bogus number of reserved sectors [ 263.135456] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xffffdd86]}}, 0x1c) 01:13:26 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x54, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 01:13:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f5"], 0xbd) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) 01:13:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:26 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:26 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690"], 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:26 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x6, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000480)={r2, &(0x7f0000000380)=""/211}) readv(r0, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/162, 0xa2}], 0x17cf724414a64c2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_buf(r3, 0x0, 0x0, &(0x7f0000000100)=""/100, &(0x7f0000000180)=0x64) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f00000002c0)=0x401) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 263.969349] FAT-fs (loop6): bogus number of reserved sectors [ 263.975405] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xe00000000000000]}}, 0x1c) 01:13:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f5"], 0xbd) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:26 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000001540)}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e1, &(0x7f0000000300)={r2}) [ 264.163230] ion_buffer_destroy: buffer still mapped in the kernel 01:13:26 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690"], 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:26 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz1\x00', 0x200002, 0x0) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)="83", 0x1, 0xffffffffffffffff) keyctl$clear(0x7, r1) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r2 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001300)='/dev/autofs\x00', 0x40000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000001380), &(0x7f00000013c0)=0xc) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000002c0)=""/4096) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f0000000100)=0x8, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x4, 0x10, 0x8, 0x100}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000001c0)={r5, 0xffffffff, 0x3, [0x3, 0xffff, 0x401]}, &(0x7f00000012c0)=0xe) 01:13:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x200000000000000]}}, 0x1c) [ 264.393094] FAT-fs (loop6): bogus number of reserved sectors [ 264.399112] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:28 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x2000000]}}, 0x1c) 01:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) 01:13:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200", 0x12}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:28 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@ethernet={0x0, @random}, &(0x7f0000000140)=0x80, 0x800) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f00000002c0)=0x60) 01:13:28 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690"], 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 265.429155] FAT-fs (loop6): invalid media value (0x00) [ 265.434569] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:28 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x43050000]}}, 0x1c) 01:13:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 265.711570] FAT-fs (loop6): invalid media value (0x00) [ 265.717053] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:29 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06"], 0xbc) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x1000000]}}, 0x1c) 01:13:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06f58401"], 0xbf) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:29 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x44000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="a1572fbb5a9005efce6d36cc50eeed34a48d36983ad1412ba52de4590833175b3084cfeb134cc2e867b3783d4c43beedf0d1fcd85d4568d0d8a6f4191d55acd5c64321b6ba29c8419645b276c399320fbc625d499d2e3b66fd29324dd6c885308019954f70573f", 0x67) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0xb5, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0x2000) listen(r2, 0x8) 01:13:29 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000"], 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:29 executing program 1: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:29 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0x10d}], 0x1000000000000179) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0x2840) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x840, 0x0) signalfd4(r0, &(0x7f0000000140)={0x80}, 0xfffffddb, 0x80000) 01:13:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06"], 0xbc) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:29 executing program 4 (fault-call:5 fault-nth:0): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x6488]}}, 0x1c) [ 266.697756] FAULT_INJECTION: forcing a failure. [ 266.697756] name failslab, interval 1, probability 0, space 0, times 0 [ 266.706212] FAT-fs (loop3): bogus number of reserved sectors [ 266.709133] CPU: 0 PID: 18378 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 266.714931] FAT-fs (loop3): Can't find a valid FAT filesystem [ 266.721803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.721810] Call Trace: [ 266.721833] dump_stack+0x1b9/0x294 [ 266.721854] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.721875] ? perf_trace_lock_acquire+0xe3/0x980 [ 266.721905] should_fail.cold.4+0xa/0x1a [ 266.721925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.721944] ? lock_downgrade+0x8e0/0x8e0 [ 266.721963] ? proc_fail_nth_write+0x96/0x1f0 [ 266.771177] ? find_held_lock+0x36/0x1c0 [ 266.775272] ? check_same_owner+0x320/0x320 [ 266.779589] ? rcu_note_context_switch+0x710/0x710 [ 266.784516] __should_failslab+0x124/0x180 [ 266.788742] should_failslab+0x9/0x14 [ 266.792531] __kmalloc+0x2c8/0x760 [ 266.796062] ? strncpy_from_user+0x500/0x500 [ 266.800461] ? fput+0x130/0x1a0 [ 266.803733] ? __x64_sys_memfd_create+0x139/0x4d0 [ 266.808571] __x64_sys_memfd_create+0x139/0x4d0 [ 266.813237] ? memfd_fcntl+0x13c0/0x13c0 [ 266.817289] ? do_syscall_64+0x92/0x800 [ 266.821261] do_syscall_64+0x1b1/0x800 [ 266.825147] ? finish_task_switch+0x1ca/0x840 [ 266.829631] ? syscall_return_slowpath+0x5c0/0x5c0 [ 266.834551] ? syscall_return_slowpath+0x30f/0x5c0 [ 266.839473] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 266.844843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.849680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.854882] RIP: 0033:0x4559f9 [ 266.858068] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.877445] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 266.885145] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 00000000004559f9 01:13:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) 01:13:29 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000"], 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) [ 266.892401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004baace [ 266.899655] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 266.906923] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000014 [ 266.914183] R13: 00000000004c1ef1 R14: 00000000004d2d10 R15: 0000000000000000 01:13:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x689]}}, 0x1c) 01:13:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) 01:13:29 executing program 4 (fault-call:5 fault-nth:1): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) [ 267.148650] FAULT_INJECTION: forcing a failure. [ 267.148650] name failslab, interval 1, probability 0, space 0, times 0 [ 267.159982] CPU: 0 PID: 18411 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 267.166926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.176287] Call Trace: [ 267.178894] dump_stack+0x1b9/0x294 [ 267.182538] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.187741] ? zap_class+0x720/0x720 [ 267.191478] should_fail.cold.4+0xa/0x1a [ 267.195555] ? debug_check_no_locks_freed+0x310/0x310 [ 267.200764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.205894] ? find_held_lock+0x36/0x1c0 [ 267.207895] FAT-fs (loop3): bogus number of reserved sectors [ 267.209983] ? check_same_owner+0x320/0x320 [ 267.210005] ? rcu_note_context_switch+0x710/0x710 [ 267.210022] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 267.210039] ? expand_files.part.8+0x56f/0x9a0 [ 267.210065] __should_failslab+0x124/0x180 [ 267.210083] should_failslab+0x9/0x14 [ 267.210098] kmem_cache_alloc+0x2af/0x760 [ 267.210119] __d_alloc+0xc0/0xd30 [ 267.215955] FAT-fs (loop3): Can't find a valid FAT filesystem [ 267.220232] ? shrink_dcache_for_umount+0x290/0x290 [ 267.220249] ? do_raw_spin_unlock+0x9e/0x2e0 [ 267.220263] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 267.220283] ? __lock_is_held+0xb5/0x140 [ 267.274240] ? _raw_spin_unlock+0x22/0x30 [ 267.278404] ? __alloc_fd+0x346/0x700 [ 267.282225] ? exit_files+0xb0/0xb0 [ 267.285870] d_alloc_pseudo+0x1d/0x30 [ 267.289685] __shmem_file_setup+0x1ed/0x6e0 [ 267.294015] ? check_same_owner+0x320/0x320 01:13:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) 01:13:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) [ 267.298353] ? shmem_fill_super+0xa30/0xa30 [ 267.302692] ? get_unused_fd_flags+0x121/0x190 [ 267.307282] ? __alloc_fd+0x700/0x700 [ 267.311093] shmem_file_setup+0x2f/0x40 [ 267.315081] __x64_sys_memfd_create+0x29d/0x4d0 [ 267.319758] ? memfd_fcntl+0x13c0/0x13c0 [ 267.323831] ? do_syscall_64+0x92/0x800 [ 267.327819] do_syscall_64+0x1b1/0x800 [ 267.331711] ? finish_task_switch+0x1ca/0x840 [ 267.336213] ? syscall_return_slowpath+0x5c0/0x5c0 [ 267.341153] ? syscall_return_slowpath+0x30f/0x5c0 [ 267.346096] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 267.351475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.356343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.361534] RIP: 0033:0x4559f9 [ 267.364722] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.384118] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 267.391840] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 00000000004559f9 [ 267.399120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004baace [ 267.406396] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 267.413664] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000014 [ 267.420928] R13: 00000000004c1ef1 R14: 00000000004d2d10 R15: 0000000000000001 01:13:30 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4df8, 0x200) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000140)={0x1f004, 0x10000, 0x9962, 0x2, 0xee4a}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x0) r3 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)='\x00', 0xffffffffffffffff) add_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r3) 01:13:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) 01:13:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf"], 0xbb) geteuid() fstat(r0, &(0x7f0000000580)) 01:13:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88a8ffff00000000]}}, 0x1c) 01:13:30 executing program 4 (fault-call:5 fault-nth:2): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:30 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000"], 0x4a) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 267.989682] FAULT_INJECTION: forcing a failure. [ 267.989682] name failslab, interval 1, probability 0, space 0, times 0 [ 268.001065] CPU: 0 PID: 18444 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 268.008012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.017377] Call Trace: [ 268.019985] dump_stack+0x1b9/0x294 [ 268.023643] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.028861] ? __kernel_text_address+0xd/0x40 [ 268.033380] should_fail.cold.4+0xa/0x1a 01:13:30 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) [ 268.037462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.042583] ? save_stack+0xa9/0xd0 [ 268.046222] ? save_stack+0x43/0xd0 [ 268.049855] ? kasan_kmalloc+0xc4/0xe0 [ 268.053745] ? kmem_cache_alloc+0x12e/0x760 [ 268.058069] ? __d_alloc+0xc0/0xd30 [ 268.061704] ? d_alloc_pseudo+0x1d/0x30 [ 268.065686] ? __shmem_file_setup+0x1ed/0x6e0 [ 268.070193] ? shmem_file_setup+0x2f/0x40 [ 268.074354] ? __x64_sys_memfd_create+0x29d/0x4d0 [ 268.079215] ? find_held_lock+0x36/0x1c0 [ 268.083309] ? check_same_owner+0x320/0x320 01:13:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 268.087653] ? rcu_note_context_switch+0x710/0x710 [ 268.092588] ? kasan_check_read+0x11/0x20 [ 268.096752] ? rcu_is_watching+0x85/0x140 [ 268.100925] __should_failslab+0x124/0x180 [ 268.105169] should_failslab+0x9/0x14 [ 268.108978] kmem_cache_alloc+0x2af/0x760 [ 268.113140] ? __raw_spin_lock_init+0x1c/0x100 [ 268.117744] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 268.122784] ? shmem_destroy_callback+0xc0/0xc0 [ 268.125231] FAT-fs (loop3): bogus number of reserved sectors [ 268.127468] shmem_alloc_inode+0x1b/0x40 01:13:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) [ 268.127485] alloc_inode+0x63/0x190 [ 268.127504] new_inode_pseudo+0x69/0x1a0 [ 268.127521] ? prune_icache_sb+0x1a0/0x1a0 [ 268.127540] ? shrink_dcache_for_umount+0x290/0x290 [ 268.127556] ? do_raw_spin_unlock+0x9e/0x2e0 [ 268.127579] new_inode+0x1c/0x40 [ 268.133404] FAT-fs (loop3): Can't find a valid FAT filesystem [ 268.137423] shmem_get_inode+0xe5/0x8f0 [ 268.137441] ? shmem_encode_fh+0x340/0x340 [ 268.137454] ? _raw_spin_unlock+0x22/0x30 [ 268.137474] ? __alloc_fd+0x346/0x700 [ 268.184111] ? exit_files+0xb0/0xb0 01:13:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) [ 268.187759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.193310] ? d_set_d_op+0x31d/0x410 [ 268.197127] __shmem_file_setup+0x249/0x6e0 [ 268.201462] ? check_same_owner+0x320/0x320 [ 268.205796] ? shmem_fill_super+0xa30/0xa30 [ 268.210134] ? get_unused_fd_flags+0x121/0x190 [ 268.214735] ? __alloc_fd+0x700/0x700 [ 268.218556] shmem_file_setup+0x2f/0x40 [ 268.222542] __x64_sys_memfd_create+0x29d/0x4d0 [ 268.227221] ? memfd_fcntl+0x13c0/0x13c0 [ 268.231298] ? do_syscall_64+0x92/0x800 [ 268.235289] do_syscall_64+0x1b1/0x800 01:13:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) [ 268.239180] ? finish_task_switch+0x1ca/0x840 [ 268.243684] ? syscall_return_slowpath+0x5c0/0x5c0 [ 268.248627] ? syscall_return_slowpath+0x30f/0x5c0 [ 268.253575] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 268.258960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.263825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.269022] RIP: 0033:0x4559f9 [ 268.272217] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.291623] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.299346] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 00000000004559f9 [ 268.306622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004baace [ 268.313900] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 268.321178] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000014 [ 268.328452] R13: 00000000004c1ef1 R14: 00000000004d2d10 R15: 0000000000000002 01:13:31 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) socket(0xa, 0x4, 0x200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) bind$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06"], 0xbc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) 01:13:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88470000]}}, 0x1c) 01:13:31 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:31 executing program 4 (fault-call:5 fault-nth:3): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:31 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000020000000080000004000000"], 0x56) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 268.944484] FAULT_INJECTION: forcing a failure. [ 268.944484] name failslab, interval 1, probability 0, space 0, times 0 [ 268.947103] FAT-fs (loop3): bogus number of reserved sectors [ 268.955788] CPU: 0 PID: 18497 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 268.955800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.955805] Call Trace: [ 268.955829] dump_stack+0x1b9/0x294 [ 268.955849] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.955869] ? __lock_acquire+0x7f5/0x5140 [ 268.961726] FAT-fs (loop3): Can't find a valid FAT filesystem [ 268.968600] should_fail.cold.4+0xa/0x1a [ 268.968622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.968643] ? find_held_lock+0x36/0x1c0 [ 268.968663] ? graph_lock+0x170/0x170 [ 269.016452] ? find_held_lock+0x36/0x1c0 [ 269.020543] ? check_same_owner+0x320/0x320 [ 269.024874] ? graph_lock+0x170/0x170 [ 269.028683] ? rcu_note_context_switch+0x710/0x710 [ 269.033646] ? kasan_check_read+0x11/0x20 [ 269.037806] ? do_raw_spin_unlock+0x9e/0x2e0 [ 269.042230] __should_failslab+0x124/0x180 [ 269.046475] should_failslab+0x9/0x14 [ 269.050283] kmem_cache_alloc+0x2af/0x760 [ 269.054438] ? find_held_lock+0x36/0x1c0 [ 269.058516] get_empty_filp+0x125/0x520 [ 269.062504] ? proc_nr_files+0x60/0x60 [ 269.066413] ? kasan_check_read+0x11/0x20 [ 269.070568] ? do_raw_spin_unlock+0x9e/0x2e0 [ 269.074984] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 269.079576] ? kasan_check_write+0x14/0x20 [ 269.083815] ? do_raw_spin_lock+0xc1/0x200 [ 269.088064] alloc_file+0x24/0x3e0 [ 269.091612] ? clear_nlink.part.9+0x65/0x80 [ 269.095946] __shmem_file_setup+0x304/0x6e0 [ 269.100278] ? check_same_owner+0x320/0x320 [ 269.104611] ? shmem_fill_super+0xa30/0xa30 [ 269.108946] ? get_unused_fd_flags+0x121/0x190 [ 269.113537] ? __alloc_fd+0x700/0x700 [ 269.117351] shmem_file_setup+0x2f/0x40 [ 269.121461] __x64_sys_memfd_create+0x29d/0x4d0 [ 269.126140] ? memfd_fcntl+0x13c0/0x13c0 [ 269.130211] ? do_syscall_64+0x92/0x800 [ 269.134220] do_syscall_64+0x1b1/0x800 [ 269.138114] ? finish_task_switch+0x1ca/0x840 [ 269.142620] ? syscall_return_slowpath+0x5c0/0x5c0 [ 269.147557] ? syscall_return_slowpath+0x30f/0x5c0 [ 269.152499] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.157879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.162737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.167932] RIP: 0033:0x4559f9 [ 269.171122] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.190533] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 269.198259] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 00000000004559f9 [ 269.205627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004baace [ 269.212895] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 269.220157] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000014 [ 269.227418] R13: 00000000004c1ef1 R14: 00000000004d2d10 R15: 0000000000000003 01:13:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:32 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) acct(&(0x7f00000000c0)='./file0\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:32 executing program 4 (fault-call:5 fault-nth:4): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06"], 0xbc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) 01:13:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88640000]}}, 0x1c) 01:13:32 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002"], 0x4b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:32 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) socketpair(0x9, 0x80f, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000100)=""/35) [ 269.934777] FAULT_INJECTION: forcing a failure. [ 269.934777] name failslab, interval 1, probability 0, space 0, times 0 [ 269.946086] CPU: 1 PID: 18529 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 269.953020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.953338] FAT-fs (loop3): bogus number of reserved sectors [ 269.962377] Call Trace: [ 269.962404] dump_stack+0x1b9/0x294 [ 269.962426] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.962456] should_fail.cold.4+0xa/0x1a [ 269.962475] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.962495] ? lock_downgrade+0x8e0/0x8e0 [ 269.968314] FAT-fs (loop3): Can't find a valid FAT filesystem [ 269.970873] ? timespec_trunc+0xe7/0x170 [ 269.970896] ? find_held_lock+0x36/0x1c0 [ 269.970930] ? check_same_owner+0x320/0x320 [ 270.011269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.016827] ? rcu_note_context_switch+0x710/0x710 [ 270.021786] __should_failslab+0x124/0x180 [ 270.026043] should_failslab+0x9/0x14 [ 270.029856] kmem_cache_alloc+0x2af/0x760 [ 270.034043] ? lock_downgrade+0x8e0/0x8e0 [ 270.038205] getname_flags+0xd0/0x5a0 [ 270.042017] getname+0x19/0x20 [ 270.045217] do_sys_open+0x39a/0x740 [ 270.048950] ? filp_open+0x80/0x80 [ 270.052498] ? do_sys_ftruncate+0x44e/0x560 [ 270.056828] __x64_sys_open+0x7e/0xc0 [ 270.060641] do_syscall_64+0x1b1/0x800 [ 270.064536] ? finish_task_switch+0x1ca/0x840 [ 270.069046] ? syscall_return_slowpath+0x5c0/0x5c0 [ 270.073986] ? syscall_return_slowpath+0x30f/0x5c0 [ 270.078926] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe 01:13:32 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 270.084309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.089178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.094373] RIP: 0033:0x40fc51 [ 270.097560] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 270.116984] RSP: 002b:00007fb75f4daba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 270.124713] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 000000000040fc51 01:13:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400000009000000fdffffff0700000000000000010000000600000002000200080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876b17000000000000000029e70fcba53a27c1c4e8b55b0f5840848ec3b0fdbaef1090d0e8a7b7f7b28c9abf06"], 0xbc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) 01:13:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x11]}}, 0x1c) [ 270.131994] RDX: 00007fb75f4dabfa RSI: 0000000000000002 RDI: 00007fb75f4dabf0 [ 270.139271] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.146549] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000015 [ 270.153823] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000004 01:13:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) [ 270.362571] FAT-fs (loop3): bogus number of reserved sectors [ 270.368572] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:33 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002"], 0x4b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:33 executing program 4 (fault-call:5 fault-nth:5): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8864]}}, 0x1c) 01:13:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:33 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x101, 0x9d, 0x10001, 0x400, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000100)='./file0\x00', r2, r3, 0x1000) [ 270.976144] FAT-fs (loop3): bogus number of reserved sectors [ 270.977599] FAULT_INJECTION: forcing a failure. [ 270.977599] name failslab, interval 1, probability 0, space 0, times 0 [ 270.982093] FAT-fs (loop3): Can't find a valid FAT filesystem [ 270.999326] CPU: 1 PID: 18599 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 271.006266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.015621] Call Trace: [ 271.018208] dump_stack+0x1b9/0x294 [ 271.021841] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.027047] should_fail.cold.4+0xa/0x1a [ 271.031108] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.036204] ? lock_downgrade+0x8e0/0x8e0 [ 271.040349] ? timespec_trunc+0xe7/0x170 [ 271.044408] ? find_held_lock+0x36/0x1c0 [ 271.048481] ? check_same_owner+0x320/0x320 [ 271.052794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.058321] ? rcu_note_context_switch+0x710/0x710 [ 271.063250] __should_failslab+0x124/0x180 [ 271.067476] should_failslab+0x9/0x14 [ 271.071277] kmem_cache_alloc+0x2af/0x760 [ 271.075422] ? lock_downgrade+0x8e0/0x8e0 [ 271.079574] getname_flags+0xd0/0x5a0 [ 271.083369] getname+0x19/0x20 [ 271.086575] do_sys_open+0x39a/0x740 [ 271.090285] ? filp_open+0x80/0x80 [ 271.093820] ? do_sys_ftruncate+0x44e/0x560 [ 271.098137] __x64_sys_open+0x7e/0xc0 [ 271.101930] do_syscall_64+0x1b1/0x800 [ 271.105811] ? syscall_return_slowpath+0x5c0/0x5c0 [ 271.110734] ? syscall_return_slowpath+0x30f/0x5c0 [ 271.115657] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 271.121020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.125860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.131038] RIP: 0033:0x40fc51 [ 271.134211] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.153595] RSP: 002b:00007fb75f4daba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 271.161298] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 000000000040fc51 [ 271.168554] RDX: 00007fb75f4dabfa RSI: 0000000000000002 RDI: 00007fb75f4dabf0 01:13:33 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 271.175811] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.183070] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000015 [ 271.190327] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000005 01:13:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4305]}}, 0x1c) 01:13:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:34 executing program 4 (fault-call:5 fault-nth:6): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) [ 271.406425] FAULT_INJECTION: forcing a failure. [ 271.406425] name failslab, interval 1, probability 0, space 0, times 0 [ 271.417901] CPU: 0 PID: 18623 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 271.424841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.434202] Call Trace: [ 271.436809] dump_stack+0x1b9/0x294 [ 271.440458] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.445673] should_fail.cold.4+0xa/0x1a [ 271.449754] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.454873] ? debug_check_no_locks_freed+0x310/0x310 [ 271.460073] ? graph_lock+0x170/0x170 [ 271.463889] ? find_held_lock+0x36/0x1c0 [ 271.467982] ? check_same_owner+0x320/0x320 [ 271.472320] ? rcu_note_context_switch+0x710/0x710 [ 271.477264] ? graph_lock+0x170/0x170 [ 271.481082] __should_failslab+0x124/0x180 [ 271.485330] should_failslab+0x9/0x14 [ 271.489142] kmem_cache_alloc+0x2af/0x760 [ 271.493310] ? debug_check_no_locks_freed+0x310/0x310 [ 271.498517] get_empty_filp+0x125/0x520 [ 271.502505] ? proc_nr_files+0x60/0x60 [ 271.506413] ? lock_downgrade+0x8e0/0x8e0 [ 271.510575] ? perf_trace_lock+0xd6/0x900 [ 271.514727] ? rcu_is_watching+0x85/0x140 [ 271.518878] path_openat+0x116/0x4dc0 [ 271.522698] ? unwind_get_return_address+0x61/0xa0 [ 271.527636] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.532653] ? path_lookupat.isra.45+0xbd0/0xbd0 [ 271.537413] ? find_held_lock+0x36/0x1c0 [ 271.541485] ? lock_downgrade+0x8e0/0x8e0 [ 271.545626] ? do_sys_open+0x39a/0x740 [ 271.549517] ? kasan_check_read+0x11/0x20 [ 271.553668] ? do_raw_spin_unlock+0x9e/0x2e0 [ 271.558075] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 271.562657] ? __lock_is_held+0xb5/0x140 [ 271.566716] ? _raw_spin_unlock+0x22/0x30 [ 271.570857] ? __alloc_fd+0x346/0x700 [ 271.574653] ? usercopy_warn+0x120/0x120 [ 271.578724] do_filp_open+0x249/0x350 [ 271.582511] ? may_open_dev+0x100/0x100 [ 271.586481] ? strncpy_from_user+0x3b6/0x500 [ 271.590881] ? mpi_free.cold.1+0x19/0x19 [ 271.594933] ? get_unused_fd_flags+0x121/0x190 [ 271.599508] ? getname_flags+0xd0/0x5a0 [ 271.603476] ? getname_flags+0x26e/0x5a0 [ 271.607524] do_sys_open+0x56f/0x740 [ 271.611224] ? filp_open+0x80/0x80 [ 271.614753] __x64_sys_open+0x7e/0xc0 [ 271.618547] do_syscall_64+0x1b1/0x800 [ 271.622419] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 271.627247] ? syscall_return_slowpath+0x5c0/0x5c0 [ 271.632161] ? syscall_return_slowpath+0x30f/0x5c0 [ 271.637091] ? retint_user+0x18/0x18 [ 271.640801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.645635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.650833] RIP: 0033:0x40fc51 [ 271.654013] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.673332] RSP: 002b:00007fb75f4daba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 271.681039] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 000000000040fc51 [ 271.688311] RDX: 00007fb75f4dabfa RSI: 0000000000000002 RDI: 00007fb75f4dabf0 [ 271.695575] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.702839] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000015 [ 271.710094] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000006 [ 271.745958] FAT-fs (loop3): bogus number of reserved sectors [ 271.751882] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:34 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8906]}}, 0x1c) 01:13:34 executing program 4 (fault-call:5 fault-nth:7): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r2, &(0x7f0000000080), 0x8, 0x0) 01:13:34 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002"], 0x4b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 271.968546] FAULT_INJECTION: forcing a failure. [ 271.968546] name failslab, interval 1, probability 0, space 0, times 0 [ 271.980263] CPU: 0 PID: 18664 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 271.987210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.996571] Call Trace: [ 271.999171] dump_stack+0x1b9/0x294 [ 272.002814] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.008030] should_fail.cold.4+0xa/0x1a [ 272.012110] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.014414] FAT-fs (loop3): bogus number of reserved sectors [ 272.017225] ? lock_release+0xa10/0xa10 [ 272.017270] ? check_same_owner+0x320/0x320 [ 272.017287] ? graph_lock+0x170/0x170 [ 272.017305] ? print_usage_bug+0xc0/0xc0 [ 272.023131] FAT-fs (loop3): Can't find a valid FAT filesystem [ 272.027060] ? graph_lock+0x170/0x170 [ 272.027081] ? find_held_lock+0x36/0x1c0 [ 272.027102] ? __lock_is_held+0xb5/0x140 [ 272.027126] ? check_same_owner+0x320/0x320 [ 272.061548] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 272.066557] ? rcu_note_context_switch+0x710/0x710 [ 272.071492] __should_failslab+0x124/0x180 [ 272.075723] should_failslab+0x9/0x14 [ 272.079517] kmem_cache_alloc_trace+0x2cb/0x780 [ 272.084258] ? init_wait_entry+0x1b0/0x1b0 [ 272.088502] ? loop_get_status64+0x140/0x140 [ 272.092898] __kthread_create_on_node+0x127/0x4c0 [ 272.097734] ? __kthread_parkme+0x1d0/0x1d0 [ 272.102050] ? __raw_spin_lock_init+0x1c/0x100 [ 272.106631] ? __lockdep_init_map+0x105/0x590 [ 272.111123] ? loop_get_status64+0x140/0x140 [ 272.115521] kthread_create_on_node+0xa8/0xd0 [ 272.120007] ? __kthread_create_on_node+0x4c0/0x4c0 [ 272.125032] ? rcu_report_qs_rnp+0x790/0x790 [ 272.129439] lo_ioctl+0x7ce/0x1d10 [ 272.132977] ? lo_rw_aio_complete+0x430/0x430 [ 272.137462] blkdev_ioctl+0x9b6/0x2020 [ 272.141340] ? blkpg_ioctl+0xc40/0xc40 [ 272.145217] ? lock_downgrade+0x8e0/0x8e0 [ 272.149362] ? rcu_is_watching+0x85/0x140 [ 272.153502] ? rcu_report_qs_rnp+0x790/0x790 [ 272.157909] ? __fget+0x40c/0x650 [ 272.161359] ? expand_files.part.8+0x9a0/0x9a0 [ 272.165932] ? trace_hardirqs_off+0xd/0x10 [ 272.170156] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 272.175252] block_ioctl+0xee/0x130 [ 272.178867] ? blkdev_fallocate+0x400/0x400 [ 272.183179] do_vfs_ioctl+0x1cf/0x16f0 [ 272.187055] ? rcu_pm_notify+0xc0/0xc0 [ 272.190937] ? ioctl_preallocate+0x2e0/0x2e0 [ 272.195347] ? fget_raw+0x20/0x20 [ 272.198786] ? putname+0xf2/0x130 [ 272.202228] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.207234] ? kmem_cache_free+0x25c/0x2d0 [ 272.211459] ? putname+0xf7/0x130 [ 272.214905] ? do_sys_open+0x3c3/0x740 [ 272.218788] ? security_file_ioctl+0x94/0xc0 [ 272.223191] ksys_ioctl+0xa9/0xd0 [ 272.226641] __x64_sys_ioctl+0x73/0xb0 [ 272.230520] do_syscall_64+0x1b1/0x800 [ 272.234396] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 272.239228] ? syscall_return_slowpath+0x5c0/0x5c0 [ 272.244168] ? syscall_return_slowpath+0x30f/0x5c0 [ 272.249090] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 272.254447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.259285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.264461] RIP: 0033:0x455867 [ 272.267637] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.287016] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.294722] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 272.301989] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 272.309247] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:13:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4888]}}, 0x1c) [ 272.316503] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 272.323758] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000007 01:13:35 executing program 4 (fault-call:5 fault-nth:8): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x2]}}, 0x1c) 01:13:35 executing program 5: r0 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x400500) read(r0, &(0x7f0000000200)=""/4096, 0x1000) r1 = signalfd4(0xffffffffffffff9c, &(0x7f0000000180)={0x3}, 0x8, 0x80000) r2 = signalfd4(r1, &(0x7f00000001c0)={0x200}, 0xffffffffffffff90, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/162, 0xffffffffffffff23}], 0x1) signalfd4(r2, &(0x7f0000000080), 0x8, 0x0) membarrier(0x20, 0x0) 01:13:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 272.574119] FAT-fs (loop3): bogus number of reserved sectors [ 272.580088] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:35 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000), 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xff, 0x100) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10000, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 272.674918] FAULT_INJECTION: forcing a failure. [ 272.674918] name failslab, interval 1, probability 0, space 0, times 0 [ 272.686390] CPU: 1 PID: 18686 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 272.693333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.702696] Call Trace: [ 272.705307] dump_stack+0x1b9/0x294 [ 272.708959] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.714166] ? perf_trace_lock_acquire+0xe3/0x980 [ 272.719022] ? __account_cfs_rq_runtime+0x600/0x600 [ 272.724068] should_fail.cold.4+0xa/0x1a [ 272.728157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.733283] ? graph_lock+0x170/0x170 [ 272.737107] ? enqueue_entity+0x343/0x2110 [ 272.741365] ? find_held_lock+0x36/0x1c0 [ 272.745447] ? __lock_is_held+0xb5/0x140 [ 272.749538] ? check_same_owner+0x320/0x320 [ 272.753877] ? perf_trace_lock+0x900/0x900 [ 272.758603] ? rcu_note_context_switch+0x710/0x710 [ 272.758632] __should_failslab+0x124/0x180 [ 272.758653] should_failslab+0x9/0x14 [ 272.758667] kmem_cache_alloc+0x2af/0x760 [ 272.758683] ? graph_lock+0x170/0x170 [ 272.758698] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.758719] __kernfs_new_node+0xe7/0x580 [ 272.758741] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 272.758761] ? lock_downgrade+0x8e0/0x8e0 [ 272.758781] ? lock_release+0xa10/0xa10 [ 272.758801] ? rcu_note_context_switch+0x710/0x710 [ 272.758822] kernfs_new_node+0x80/0xf0 [ 272.758842] kernfs_create_dir_ns+0x3d/0x140 [ 272.758863] internal_create_group+0x110/0x970 [ 272.758881] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 272.758907] sysfs_create_group+0x1f/0x30 [ 272.758925] lo_ioctl+0x12c8/0x1d10 [ 272.758951] ? lo_rw_aio_complete+0x430/0x430 [ 272.758968] blkdev_ioctl+0x9b6/0x2020 [ 272.758986] ? blkpg_ioctl+0xc40/0xc40 [ 272.759003] ? lock_downgrade+0x8e0/0x8e0 [ 272.759029] ? rcu_is_watching+0x85/0x140 [ 272.759047] ? rcu_report_qs_rnp+0x790/0x790 [ 272.759073] ? __fget+0x40c/0x650 [ 272.759103] ? expand_files.part.8+0x9a0/0x9a0 [ 272.759122] ? trace_hardirqs_off+0xd/0x10 [ 272.759139] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 272.759163] block_ioctl+0xee/0x130 [ 272.759180] ? blkdev_fallocate+0x400/0x400 [ 272.759198] do_vfs_ioctl+0x1cf/0x16f0 [ 272.759211] ? rcu_pm_notify+0xc0/0xc0 [ 272.759232] ? ioctl_preallocate+0x2e0/0x2e0 [ 272.759249] ? fget_raw+0x20/0x20 [ 272.759261] ? putname+0xf2/0x130 [ 272.759277] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.759293] ? kmem_cache_free+0x25c/0x2d0 [ 272.759310] ? putname+0xf7/0x130 [ 272.759330] ? do_sys_open+0x3c3/0x740 [ 272.759353] ? security_file_ioctl+0x94/0xc0 [ 272.759372] ksys_ioctl+0xa9/0xd0 [ 272.759393] __x64_sys_ioctl+0x73/0xb0 [ 272.759411] do_syscall_64+0x1b1/0x800 [ 272.759426] ? finish_task_switch+0x1ca/0x840 [ 272.759444] ? syscall_return_slowpath+0x5c0/0x5c0 [ 272.759462] ? syscall_return_slowpath+0x30f/0x5c0 [ 272.759483] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 272.759505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.759528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.759540] RIP: 0033:0x455867 [ 272.759546] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.759879] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.759896] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 272.759906] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 272.759916] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.759925] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 272.759935] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000008 [ 272.820181] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. 01:13:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8847000000000000]}}, 0x1c) 01:13:35 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:35 executing program 4 (fault-call:5 fault-nth:9): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:35 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000"], 0x51) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:35 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='self\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r3, 0x7fff}, &(0x7f0000000180)=0x8) r4 = signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)=0x0) fcntl$setown(r4, 0x8, r5) [ 272.820194] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 272.820202] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 273.273320] FAT-fs (loop3): bogus number of reserved sectors [ 273.279282] FAT-fs (loop3): Can't find a valid FAT filesystem [ 273.279466] FAULT_INJECTION: forcing a failure. [ 273.279466] name failslab, interval 1, probability 0, space 0, times 0 [ 273.296583] CPU: 0 PID: 18740 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 273.303525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.312893] Call Trace: [ 273.315496] dump_stack+0x1b9/0x294 [ 273.319137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 273.324338] ? zap_class+0x720/0x720 [ 273.328071] should_fail.cold.4+0xa/0x1a [ 273.332150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.337273] ? graph_lock+0x170/0x170 [ 273.341090] ? find_held_lock+0x36/0x1c0 [ 273.345166] ? find_held_lock+0x36/0x1c0 [ 273.349246] ? __lock_is_held+0xb5/0x140 [ 273.353332] ? check_same_owner+0x320/0x320 [ 273.357669] ? graph_lock+0x170/0x170 [ 273.361485] ? rcu_note_context_switch+0x710/0x710 [ 273.366428] ? kasan_check_write+0x14/0x20 [ 273.370677] __should_failslab+0x124/0x180 [ 273.374925] should_failslab+0x9/0x14 [ 273.378736] kmem_cache_alloc+0x2af/0x760 [ 273.382903] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.387937] __kernfs_new_node+0xe7/0x580 [ 273.392106] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 273.396871] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 273.402406] ? kernfs_link_sibling+0x1d2/0x3b0 [ 273.406990] ? kernfs_add_one+0x16f/0x620 [ 273.411139] ? kernfs_activate+0x2a0/0x2a0 [ 273.415370] kernfs_new_node+0x80/0xf0 [ 273.419253] __kernfs_create_file+0x4d/0x330 [ 273.423653] sysfs_add_file_mode_ns+0x21a/0x560 [ 273.428324] internal_create_group+0x282/0x970 [ 273.432908] sysfs_create_group+0x1f/0x30 [ 273.437052] lo_ioctl+0x12c8/0x1d10 [ 273.440678] ? lo_rw_aio_complete+0x430/0x430 [ 273.445164] blkdev_ioctl+0x9b6/0x2020 [ 273.449060] ? blkpg_ioctl+0xc40/0xc40 [ 273.452939] ? lock_downgrade+0x8e0/0x8e0 [ 273.457085] ? rcu_is_watching+0x85/0x140 [ 273.461223] ? rcu_report_qs_rnp+0x790/0x790 [ 273.465630] ? __fget+0x40c/0x650 [ 273.469080] ? expand_files.part.8+0x9a0/0x9a0 [ 273.473741] ? trace_hardirqs_off+0xd/0x10 [ 273.477967] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 273.483065] block_ioctl+0xee/0x130 [ 273.486684] ? blkdev_fallocate+0x400/0x400 [ 273.490996] do_vfs_ioctl+0x1cf/0x16f0 [ 273.494875] ? rcu_pm_notify+0xc0/0xc0 [ 273.498756] ? ioctl_preallocate+0x2e0/0x2e0 [ 273.503155] ? fget_raw+0x20/0x20 [ 273.506605] ? putname+0xf2/0x130 [ 273.510054] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.515059] ? kmem_cache_free+0x25c/0x2d0 [ 273.519284] ? putname+0xf7/0x130 [ 273.522728] ? do_sys_open+0x3c3/0x740 [ 273.526610] ? security_file_ioctl+0x94/0xc0 [ 273.531013] ksys_ioctl+0xa9/0xd0 [ 273.534467] __x64_sys_ioctl+0x73/0xb0 [ 273.538360] do_syscall_64+0x1b1/0x800 [ 273.542240] ? finish_task_switch+0x1ca/0x840 [ 273.546727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 273.551646] ? syscall_return_slowpath+0x30f/0x5c0 [ 273.556570] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 273.561927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.566765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.571962] RIP: 0033:0x455867 [ 273.575134] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.594538] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.602254] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 273.609512] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 273.616782] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:13:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = open(&(0x7f0000fbe000)='./control\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat(r0, &(0x7f000001aff8)='./file0\x00', 0x20040, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x40049409, r1) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r3, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r4 = signalfd4(r3, &(0x7f0000000080), 0x8, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x4000, 0x0) writev(r4, &(0x7f00000007c0)=[{&(0x7f0000000100)="c910a90623c3128cad795e7260d363e204155c0377e3f7be98be17e92d9750fcb498bd99470549af621aae4f2543cd63935375294586a070bde0d5e1c32d1352393566a918abc61aba0e49f42a4497c333c36c2c78eaa39782c9771fa0a397b62e9525619fd6c8733bfad98e426c131c2f5ac5918dd8f5c2d52e24bea5ad1251f1904a7e9de9d3495f67dbe9b7cf6ce533e096d44849ab034685dac710922f3c7be076d69a26e47f5314231f5ab1228d174892e1a8c613b719e73b37feb42083d49cf0c966564fd7bc5c3f9d119e0cab3b27ca79b96e77f7b4c03b59", 0xdc}, {&(0x7f00000002c0)="a3861d8a644f29eb907feba917bf6a8194", 0x11}, {&(0x7f0000000300)="d7218baca50a3018e0f79286a8069d1b7f771dcdeef2610b5bd8dd9e00aa476fbf43792b798465cef1896b20ceeecbb1c61ad1c362841b7efecd4ad346a7731e97b60ad77791be64e0221adb6c7e472bf27b128ee8f6bb6cec9c7d3f5022a8e644cbab00a9c6a62d173410aca1e3f049a58b14fda14fa0524b6230cc94096297e0eb422d759e6cf5abf4a4fb8b0f4b22b92170af3934a8bb1ec07d99791eee775bf2453a393d209465a5472a298fc1adb49638634d5fd8033da704dc15272a3ed0c6", 0xc2}, {&(0x7f0000000400)="3fb6a90283a4315d9092102c503078b0e03a016e4a7afc6504081bab3b32335de767a82f9fdc7ee24d5913a7f25b58", 0x2f}, {&(0x7f0000000440)="ceafded50cb905aa4924d28796b16f743b005080a3f2a0b382dc1e72ead442f428d5e722b493f8dc9e0d924ea694497164ce14357ff1afd36f5cfa48cf90a4d147a946f33e232a69cc26e5a3d4f2be91b7388cb94e89807e71b2a0eab836c1db420b55e1c19b5df734dd546f6552f185ebe1274927a4bb2f2cebb98f4aee6e1236731f8b8a95e30f83e705a6a902f8f45fe75e6a3490c81c91bdfb5579324876250186a4fa1ae7c8eea39f97e367f750aaf28991ff84abadcb5824dd050bf10053f72ede5ad08c", 0xc7}, {&(0x7f0000000540)="c28419e00f2306e4e2a17a5d47a874cc55c0643166f3f7b2f1a3db11e69d70acc16af2e1bd51a6a20f2f930820aa7756f9acf6bacf1d3131c7100b88934e4e328df43dc7a4a29bca1534b99c1d4b35e6c505485d31d754f48e15739ffea3c3419a24b154939b56ab41bc235ab247195f72a983170ceb9949212b54d2918fbc7faa83c4c288fe1bc9fb69824c8135cdf0eab14af3fede4e10a2e2a479b80b141c3389c27665dccc0b5bec4d73474364954f5dcb8d3341e4e6f63c0027c5a566769babfc087567f3780465a8f7ab64d2db35ae20776d647c10dee62cb507d66f90af55b26051aad93589e1a8bf", 0xec}, {&(0x7f0000000640)="661019951ba9724fed0b16de250e3fd4cd56b29cf08805b4b8a6810f63ee07716fb236680f2edeb072a6372d04ab2adcb2d76436aba65edb9264a89c97800d71adbcce7b8c6290f6854e5e2ef010a299c866cd559f3cf4095a51c52db653b2bcde0fe0418a752af10173cd52dcbd793373602495cb658c708dfdf612b9a5fc8e36d36dea552a", 0x86}, {&(0x7f0000000700)="d6571a8b371fbfb74f350baedbb675f4524178c007d3b5dee9d0269ddf1cb24fcdcba8d0763c522c7ff2c27147fb6372194f61228596196c8df03ba67397b85904a1f37da0e06c23e271279e0360d6a4a6b2fb2bbcf1d69914c270e47a8dad47af9cbff7a4cc211431f8c1d8821236fe1bb59c", 0x73}, {&(0x7f0000000780)="b635864822319a0de9212dece58a6ba2441dcdba436488fb6e9bf73ace336006caca6e00b91042e6dff718eb2cc60d99f9d216f5", 0x34}], 0x9) 01:13:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8864000000000000]}}, 0x1c) [ 273.624666] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 273.631929] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000009 01:13:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:36 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000080)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000200)="abc8f4d1eba47bc0ae05cbcb0adf0f371e405ce351b823c5fa121d72d7271c743d", &(0x7f0000000540)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000100)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x6, 0x101000) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) [ 273.807885] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 273.815866] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 273.824505] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x800000000000000]}}, 0x1c) 01:13:36 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:36 executing program 4 (fault-call:5 fault-nth:10): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 273.944785] FAT-fs (loop3): bogus number of reserved sectors [ 273.950712] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:36 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffd}, 0xfffffffffffffe60, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0x345}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x4]}}, 0x1c) [ 274.176341] FAULT_INJECTION: forcing a failure. [ 274.176341] name failslab, interval 1, probability 0, space 0, times 0 [ 274.187718] CPU: 0 PID: 18799 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 274.194654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.204013] Call Trace: [ 274.206620] dump_stack+0x1b9/0x294 [ 274.210271] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.215480] ? mutex_trylock+0x2a0/0x2a0 [ 274.219565] should_fail.cold.4+0xa/0x1a [ 274.223645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.228764] ? __kernfs_new_node+0xe7/0x580 [ 274.233101] ? graph_lock+0x170/0x170 [ 274.236915] ? find_held_lock+0x36/0x1c0 [ 274.240988] ? find_held_lock+0x36/0x1c0 [ 274.245061] ? __lock_is_held+0xb5/0x140 [ 274.249128] ? check_same_owner+0x320/0x320 [ 274.253443] ? graph_lock+0x170/0x170 [ 274.257239] ? rcu_note_context_switch+0x710/0x710 [ 274.262161] ? kasan_check_write+0x14/0x20 [ 274.266392] __should_failslab+0x124/0x180 [ 274.270620] should_failslab+0x9/0x14 [ 274.274406] kmem_cache_alloc+0x2af/0x760 [ 274.278547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.283553] __kernfs_new_node+0xe7/0x580 [ 274.287690] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.292435] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 274.297965] ? kernfs_link_sibling+0x1d2/0x3b0 [ 274.302541] ? kernfs_add_one+0x16f/0x620 [ 274.306681] ? kernfs_activate+0x2a0/0x2a0 [ 274.310910] kernfs_new_node+0x80/0xf0 [ 274.314793] __kernfs_create_file+0x4d/0x330 [ 274.319196] sysfs_add_file_mode_ns+0x21a/0x560 [ 274.323858] internal_create_group+0x282/0x970 [ 274.328439] sysfs_create_group+0x1f/0x30 [ 274.332579] lo_ioctl+0x12c8/0x1d10 [ 274.336201] ? lo_rw_aio_complete+0x430/0x430 [ 274.340685] blkdev_ioctl+0x9b6/0x2020 [ 274.344563] ? blkpg_ioctl+0xc40/0xc40 [ 274.348441] ? lock_downgrade+0x8e0/0x8e0 [ 274.352586] ? kasan_check_read+0x11/0x20 [ 274.356724] ? rcu_is_watching+0x85/0x140 [ 274.360871] ? rcu_report_qs_rnp+0x790/0x790 [ 274.365283] ? __fget+0x40c/0x650 [ 274.368742] ? expand_files.part.8+0x9a0/0x9a0 [ 274.373330] ? trace_hardirqs_off+0xd/0x10 [ 274.377555] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 274.382650] block_ioctl+0xee/0x130 [ 274.386276] ? blkdev_fallocate+0x400/0x400 [ 274.390586] do_vfs_ioctl+0x1cf/0x16f0 [ 274.394463] ? rcu_pm_notify+0xc0/0xc0 [ 274.398354] ? ioctl_preallocate+0x2e0/0x2e0 [ 274.402752] ? fget_raw+0x20/0x20 [ 274.406191] ? putname+0xf2/0x130 [ 274.409633] ? rcu_read_lock_sched_held+0x108/0x120 [ 274.414639] ? kmem_cache_free+0x25c/0x2d0 [ 274.418863] ? putname+0xf7/0x130 [ 274.422304] ? do_sys_open+0x3c3/0x740 [ 274.426208] ? security_file_ioctl+0x94/0xc0 [ 274.430607] ksys_ioctl+0xa9/0xd0 [ 274.434055] __x64_sys_ioctl+0x73/0xb0 [ 274.437947] do_syscall_64+0x1b1/0x800 [ 274.441820] ? finish_task_switch+0x1ca/0x840 [ 274.446319] ? syscall_return_slowpath+0x5c0/0x5c0 [ 274.451237] ? syscall_return_slowpath+0x30f/0x5c0 [ 274.456157] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 274.461529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.466364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.471543] RIP: 0033:0x455867 [ 274.474726] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.494074] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.501774] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 274.509035] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 274.516290] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.523549] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 274.530806] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000a [ 274.547444] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 274.555426] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 274.564058] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200", 0x12}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:37 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r1 = dup(r0) getpeername$ipx(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x2) r4 = add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r4) 01:13:37 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000"], 0x51) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x8]}}, 0x1c) 01:13:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:37 executing program 4 (fault-call:5 fault-nth:11): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 274.684773] FAT-fs (loop3): invalid media value (0x00) [ 274.690206] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:37 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 274.871225] FAULT_INJECTION: forcing a failure. [ 274.871225] name failslab, interval 1, probability 0, space 0, times 0 [ 274.882568] CPU: 0 PID: 18856 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 274.889498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.898855] Call Trace: [ 274.901458] dump_stack+0x1b9/0x294 [ 274.905106] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.910318] ? mutex_trylock+0x2a0/0x2a0 [ 274.914397] should_fail.cold.4+0xa/0x1a [ 274.918470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.923563] ? __kernfs_new_node+0xe7/0x580 [ 274.927873] ? graph_lock+0x170/0x170 [ 274.931660] ? find_held_lock+0x36/0x1c0 [ 274.935705] ? find_held_lock+0x36/0x1c0 [ 274.939766] ? __lock_is_held+0xb5/0x140 [ 274.943826] ? check_same_owner+0x320/0x320 [ 274.948136] ? graph_lock+0x170/0x170 [ 274.951947] ? rcu_note_context_switch+0x710/0x710 [ 274.956959] ? kasan_check_write+0x14/0x20 [ 274.961183] __should_failslab+0x124/0x180 [ 274.965409] should_failslab+0x9/0x14 [ 274.969193] kmem_cache_alloc+0x2af/0x760 [ 274.973347] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.978363] __kernfs_new_node+0xe7/0x580 [ 274.982507] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.987265] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 274.992885] ? kernfs_link_sibling+0x1d2/0x3b0 [ 274.997471] ? kernfs_add_one+0x16f/0x620 [ 275.001613] ? kernfs_activate+0x2a0/0x2a0 [ 275.005848] kernfs_new_node+0x80/0xf0 [ 275.009727] __kernfs_create_file+0x4d/0x330 [ 275.014129] sysfs_add_file_mode_ns+0x21a/0x560 [ 275.018787] internal_create_group+0x282/0x970 [ 275.023376] sysfs_create_group+0x1f/0x30 [ 275.027527] lo_ioctl+0x12c8/0x1d10 [ 275.031161] ? lo_rw_aio_complete+0x430/0x430 [ 275.035641] blkdev_ioctl+0x9b6/0x2020 [ 275.039510] ? blkpg_ioctl+0xc40/0xc40 [ 275.043386] ? lock_downgrade+0x8e0/0x8e0 [ 275.047535] ? kasan_check_read+0x11/0x20 [ 275.051671] ? rcu_is_watching+0x85/0x140 [ 275.055805] ? rcu_report_qs_rnp+0x790/0x790 [ 275.060205] ? __fget+0x40c/0x650 [ 275.063660] ? expand_files.part.8+0x9a0/0x9a0 [ 275.068239] ? trace_hardirqs_off+0xd/0x10 [ 275.072465] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 275.077566] block_ioctl+0xee/0x130 [ 275.081179] ? blkdev_fallocate+0x400/0x400 [ 275.085486] do_vfs_ioctl+0x1cf/0x16f0 [ 275.089358] ? rcu_pm_notify+0xc0/0xc0 [ 275.093231] ? ioctl_preallocate+0x2e0/0x2e0 [ 275.097623] ? fget_raw+0x20/0x20 [ 275.101066] ? putname+0xf2/0x130 [ 275.104509] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.109512] ? kmem_cache_free+0x25c/0x2d0 [ 275.113739] ? putname+0xf7/0x130 [ 275.117181] ? do_sys_open+0x3c3/0x740 [ 275.121072] ? security_file_ioctl+0x94/0xc0 [ 275.125472] ksys_ioctl+0xa9/0xd0 [ 275.128922] __x64_sys_ioctl+0x73/0xb0 [ 275.132806] do_syscall_64+0x1b1/0x800 [ 275.136674] ? finish_task_switch+0x1ca/0x840 [ 275.141168] ? syscall_return_slowpath+0x5c0/0x5c0 [ 275.146089] ? syscall_return_slowpath+0x30f/0x5c0 [ 275.151017] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 275.156377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.161217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.166403] RIP: 0033:0x455867 [ 275.169595] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.188821] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.196515] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 275.203766] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 275.211034] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.218288] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 275.225542] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000b [ 275.235718] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. 01:13:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88a8ffff]}}, 0x1c) 01:13:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200", 0x12}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:38 executing program 4 (fault-call:5 fault-nth:12): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:38 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000"], 0x51) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:38 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x109200) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000100)=0x3f) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 275.638505] FAT-fs (loop3): invalid media value (0x00) [ 275.643927] FAT-fs (loop3): Can't find a valid FAT filesystem [ 275.662590] FAULT_INJECTION: forcing a failure. [ 275.662590] name failslab, interval 1, probability 0, space 0, times 0 [ 275.673970] CPU: 0 PID: 18880 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 275.680910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.690265] Call Trace: [ 275.692861] dump_stack+0x1b9/0x294 [ 275.696494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 275.701689] ? zap_class+0x720/0x720 [ 275.705405] should_fail.cold.4+0xa/0x1a [ 275.709461] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.714562] ? graph_lock+0x170/0x170 [ 275.718357] ? find_held_lock+0x36/0x1c0 [ 275.722427] ? find_held_lock+0x36/0x1c0 [ 275.726483] ? __lock_is_held+0xb5/0x140 [ 275.730546] ? check_same_owner+0x320/0x320 [ 275.734859] ? graph_lock+0x170/0x170 [ 275.738652] ? rcu_note_context_switch+0x710/0x710 [ 275.743572] ? kasan_check_write+0x14/0x20 [ 275.747802] __should_failslab+0x124/0x180 [ 275.752051] should_failslab+0x9/0x14 [ 275.755844] kmem_cache_alloc+0x2af/0x760 [ 275.759991] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.765002] __kernfs_new_node+0xe7/0x580 [ 275.769150] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 275.773896] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 275.779424] ? kernfs_link_sibling+0x1d2/0x3b0 [ 275.784002] ? kernfs_add_one+0x16f/0x620 [ 275.788167] ? kernfs_activate+0x2a0/0x2a0 [ 275.792397] kernfs_new_node+0x80/0xf0 [ 275.796295] __kernfs_create_file+0x4d/0x330 [ 275.800698] sysfs_add_file_mode_ns+0x21a/0x560 [ 275.805366] internal_create_group+0x282/0x970 [ 275.809950] sysfs_create_group+0x1f/0x30 [ 275.814091] lo_ioctl+0x12c8/0x1d10 [ 275.817716] ? lo_rw_aio_complete+0x430/0x430 [ 275.822204] blkdev_ioctl+0x9b6/0x2020 [ 275.826082] ? blkpg_ioctl+0xc40/0xc40 [ 275.829963] ? lock_downgrade+0x8e0/0x8e0 [ 275.834133] ? rcu_is_watching+0x85/0x140 [ 275.838274] ? rcu_report_qs_rnp+0x790/0x790 [ 275.842684] ? __fget+0x40c/0x650 [ 275.846133] ? expand_files.part.8+0x9a0/0x9a0 [ 275.850706] ? trace_hardirqs_off+0xd/0x10 [ 275.854931] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 275.860035] block_ioctl+0xee/0x130 [ 275.863655] ? blkdev_fallocate+0x400/0x400 [ 275.867969] do_vfs_ioctl+0x1cf/0x16f0 [ 275.871845] ? rcu_pm_notify+0xc0/0xc0 [ 275.875739] ? ioctl_preallocate+0x2e0/0x2e0 [ 275.880138] ? fget_raw+0x20/0x20 [ 275.883580] ? putname+0xf2/0x130 [ 275.887029] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.892044] ? kmem_cache_free+0x25c/0x2d0 [ 275.896273] ? putname+0xf7/0x130 [ 275.899717] ? do_sys_open+0x3c3/0x740 [ 275.903598] ? security_file_ioctl+0x94/0xc0 [ 275.908000] ksys_ioctl+0xa9/0xd0 [ 275.911452] __x64_sys_ioctl+0x73/0xb0 [ 275.915335] do_syscall_64+0x1b1/0x800 [ 275.919217] ? finish_task_switch+0x1ca/0x840 [ 275.923701] ? syscall_return_slowpath+0x5c0/0x5c0 [ 275.928623] ? syscall_return_slowpath+0x30f/0x5c0 [ 275.933557] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 275.938915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.944536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.949715] RIP: 0033:0x455867 [ 275.952889] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.972289] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.979998] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 275.987267] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 275.994522] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.001779] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 276.009040] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000c 01:13:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x11000000]}}, 0x1c) 01:13:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200", 0x12}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:38 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x88caffff]}}, 0x1c) 01:13:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:39 executing program 4 (fault-call:5 fault-nth:13): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 276.287088] FAT-fs (loop3): invalid media value (0x00) [ 276.292536] FAT-fs (loop3): Can't find a valid FAT filesystem [ 276.424677] FAULT_INJECTION: forcing a failure. [ 276.424677] name failslab, interval 1, probability 0, space 0, times 0 [ 276.436075] CPU: 1 PID: 18933 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 276.443017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.452383] Call Trace: [ 276.454994] dump_stack+0x1b9/0x294 [ 276.458649] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.463850] ? perf_trace_lock_acquire+0xe3/0x980 [ 276.468695] should_fail.cold.4+0xa/0x1a [ 276.472751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.477858] ? graph_lock+0x170/0x170 [ 276.481658] ? find_held_lock+0x36/0x1c0 [ 276.485715] ? __lock_is_held+0xb5/0x140 [ 276.489783] ? check_same_owner+0x320/0x320 [ 276.494094] ? graph_lock+0x170/0x170 [ 276.497886] ? rcu_note_context_switch+0x710/0x710 [ 276.502808] ? kasan_check_write+0x14/0x20 [ 276.507043] __should_failslab+0x124/0x180 [ 276.511462] should_failslab+0x9/0x14 [ 276.515255] kmem_cache_alloc+0x2af/0x760 [ 276.519400] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.524409] __kernfs_new_node+0xe7/0x580 [ 276.528554] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 276.533302] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.538830] ? kernfs_link_sibling+0x1d2/0x3b0 [ 276.543409] ? kernfs_add_one+0x16f/0x620 [ 276.547572] ? kernfs_activate+0x2a0/0x2a0 [ 276.551805] kernfs_new_node+0x80/0xf0 [ 276.555686] __kernfs_create_file+0x4d/0x330 [ 276.560104] sysfs_add_file_mode_ns+0x21a/0x560 [ 276.564775] internal_create_group+0x282/0x970 [ 276.569357] sysfs_create_group+0x1f/0x30 [ 276.573513] lo_ioctl+0x12c8/0x1d10 [ 276.577140] ? lo_rw_aio_complete+0x430/0x430 [ 276.581625] blkdev_ioctl+0x9b6/0x2020 [ 276.585505] ? blkpg_ioctl+0xc40/0xc40 [ 276.589386] ? lock_downgrade+0x8e0/0x8e0 [ 276.593531] ? rcu_is_watching+0x85/0x140 [ 276.597668] ? rcu_report_qs_rnp+0x790/0x790 [ 276.602076] ? __fget+0x40c/0x650 [ 276.605528] ? expand_files.part.8+0x9a0/0x9a0 [ 276.610113] ? trace_hardirqs_off+0xd/0x10 [ 276.614340] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 276.619439] block_ioctl+0xee/0x130 [ 276.623054] ? blkdev_fallocate+0x400/0x400 [ 276.627365] do_vfs_ioctl+0x1cf/0x16f0 [ 276.631240] ? rcu_pm_notify+0xc0/0xc0 [ 276.635122] ? ioctl_preallocate+0x2e0/0x2e0 [ 276.639522] ? fget_raw+0x20/0x20 [ 276.642961] ? putname+0xf2/0x130 [ 276.646404] ? rcu_read_lock_sched_held+0x108/0x120 [ 276.651408] ? kmem_cache_free+0x25c/0x2d0 [ 276.655634] ? putname+0xf7/0x130 [ 276.659078] ? do_sys_open+0x3c3/0x740 [ 276.662962] ? security_file_ioctl+0x94/0xc0 [ 276.667362] ksys_ioctl+0xa9/0xd0 [ 276.670811] __x64_sys_ioctl+0x73/0xb0 [ 276.674691] do_syscall_64+0x1b1/0x800 [ 276.678568] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 276.683401] ? syscall_return_slowpath+0x5c0/0x5c0 [ 276.688323] ? syscall_return_slowpath+0x30f/0x5c0 [ 276.693246] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 276.698618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.703454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.708632] RIP: 0033:0x455867 [ 276.711806] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.731184] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.738895] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 276.746164] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 276.753419] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.760686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 276.767941] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000d 01:13:39 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0xe00]}}, 0x1c) 01:13:39 executing program 4 (fault-call:5 fault-nth:14): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[], 0x0) 01:13:39 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8000, 0x0) accept$packet(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:39 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400"], 0x54) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 277.071021] FAULT_INJECTION: forcing a failure. [ 277.071021] name failslab, interval 1, probability 0, space 0, times 0 [ 277.082427] CPU: 0 PID: 18949 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 277.089362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.098727] Call Trace: [ 277.101332] dump_stack+0x1b9/0x294 [ 277.104980] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.110237] ? zap_class+0x720/0x720 [ 277.113981] should_fail.cold.4+0xa/0x1a [ 277.118064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.123196] ? graph_lock+0x170/0x170 [ 277.127027] ? find_held_lock+0x36/0x1c0 [ 277.131110] ? find_held_lock+0x36/0x1c0 [ 277.135196] ? __lock_is_held+0xb5/0x140 [ 277.139288] ? check_same_owner+0x320/0x320 [ 277.143630] ? graph_lock+0x170/0x170 [ 277.145546] FAT-fs (loop3): invalid media value (0x00) [ 277.147444] ? rcu_note_context_switch+0x710/0x710 [ 277.147463] ? kasan_check_write+0x14/0x20 [ 277.147485] __should_failslab+0x124/0x180 [ 277.147505] should_failslab+0x9/0x14 [ 277.147520] kmem_cache_alloc+0x2af/0x760 [ 277.147541] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.147559] __kernfs_new_node+0xe7/0x580 [ 277.152862] FAT-fs (loop3): Can't find a valid FAT filesystem [ 277.157757] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 277.157777] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 277.157794] ? kernfs_link_sibling+0x1d2/0x3b0 [ 277.204021] ? kernfs_add_one+0x16f/0x620 [ 277.208191] ? kernfs_activate+0x2a0/0x2a0 [ 277.212451] kernfs_new_node+0x80/0xf0 [ 277.216354] __kernfs_create_file+0x4d/0x330 [ 277.220783] sysfs_add_file_mode_ns+0x21a/0x560 [ 277.225477] internal_create_group+0x282/0x970 [ 277.230083] sysfs_create_group+0x1f/0x30 [ 277.234254] lo_ioctl+0x12c8/0x1d10 [ 277.237899] ? lo_rw_aio_complete+0x430/0x430 [ 277.242416] blkdev_ioctl+0x9b6/0x2020 [ 277.246300] ? blkpg_ioctl+0xc40/0xc40 [ 277.250185] ? lock_downgrade+0x8e0/0x8e0 [ 277.254335] ? rcu_is_watching+0x85/0x140 [ 277.258474] ? rcu_report_qs_rnp+0x790/0x790 [ 277.262882] ? __fget+0x40c/0x650 [ 277.266343] ? expand_files.part.8+0x9a0/0x9a0 [ 277.270916] ? trace_hardirqs_off+0xd/0x10 [ 277.275143] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 277.280246] block_ioctl+0xee/0x130 [ 277.283862] ? blkdev_fallocate+0x400/0x400 [ 277.288188] do_vfs_ioctl+0x1cf/0x16f0 [ 277.292069] ? rcu_pm_notify+0xc0/0xc0 [ 277.295956] ? ioctl_preallocate+0x2e0/0x2e0 [ 277.300355] ? fget_raw+0x20/0x20 [ 277.303797] ? putname+0xf2/0x130 [ 277.307240] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.312249] ? kmem_cache_free+0x25c/0x2d0 [ 277.316474] ? putname+0xf7/0x130 [ 277.319918] ? do_sys_open+0x3c3/0x740 [ 277.323801] ? security_file_ioctl+0x94/0xc0 [ 277.328223] ksys_ioctl+0xa9/0xd0 [ 277.331669] __x64_sys_ioctl+0x73/0xb0 [ 277.335551] do_syscall_64+0x1b1/0x800 [ 277.339426] ? finish_task_switch+0x1ca/0x840 [ 277.343925] ? syscall_return_slowpath+0x5c0/0x5c0 [ 277.348856] ? syscall_return_slowpath+0x30f/0x5c0 [ 277.353778] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 277.359136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.363992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.369173] RIP: 0033:0x455867 [ 277.372352] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.391721] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.399422] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 277.406678] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 277.413948] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:13:40 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000480), 0x87de64e75caaf976, 0x80800) r1 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@llc, &(0x7f00000001c0)=0x80, 0x80800) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000340)) msgget(0x1, 0x80) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x7ff, 0x1, 0xa6, 0x1, 0x6}, 0x14) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x1ff, 0x9, [0x60, 0x0, 0x400, 0x800000000000, 0xfffffffffffffffc, 0x3, 0x5, 0x7, 0x800]}, &(0x7f00000003c0)=0x1a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000400)={r3, 0x4}, 0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000100)={0x9, 0x7, 0x9, 0x3, 0x0, 0x3}) 01:13:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c87dc8dd9dbf76e"], 0x1fd) 01:13:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x1100]}}, 0x1c) [ 277.421226] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 277.428484] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000e [ 277.477407] QAT: Invalid ioctl 01:13:40 executing program 4 (fault-call:5 fault-nth:15): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 277.512615] QAT: Invalid ioctl 01:13:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[], 0x0) 01:13:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) [ 277.636948] FAULT_INJECTION: forcing a failure. [ 277.636948] name failslab, interval 1, probability 0, space 0, times 0 [ 277.648349] CPU: 0 PID: 18992 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 277.655291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.664655] Call Trace: [ 277.667260] dump_stack+0x1b9/0x294 [ 277.670910] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.676388] ? perf_trace_lock_acquire+0xe3/0x980 [ 277.681259] should_fail.cold.4+0xa/0x1a [ 277.685345] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.690477] ? graph_lock+0x170/0x170 [ 277.694306] ? find_held_lock+0x36/0x1c0 [ 277.698482] ? __lock_is_held+0xb5/0x140 [ 277.702568] ? check_same_owner+0x320/0x320 [ 277.706884] ? graph_lock+0x170/0x170 [ 277.710677] ? rcu_note_context_switch+0x710/0x710 [ 277.715596] ? kasan_check_write+0x14/0x20 [ 277.719824] __should_failslab+0x124/0x180 [ 277.724056] should_failslab+0x9/0x14 [ 277.727845] kmem_cache_alloc+0x2af/0x760 [ 277.731994] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.737013] __kernfs_new_node+0xe7/0x580 [ 277.741158] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 277.745932] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 277.751460] ? kernfs_link_sibling+0x1d2/0x3b0 [ 277.756041] ? kernfs_add_one+0x16f/0x620 [ 277.760193] ? kernfs_activate+0x2a0/0x2a0 [ 277.764422] kernfs_new_node+0x80/0xf0 [ 277.768305] __kernfs_create_file+0x4d/0x330 [ 277.772717] sysfs_add_file_mode_ns+0x21a/0x560 [ 277.777385] internal_create_group+0x282/0x970 [ 277.781967] sysfs_create_group+0x1f/0x30 [ 277.786112] lo_ioctl+0x12c8/0x1d10 [ 277.789750] ? lo_rw_aio_complete+0x430/0x430 [ 277.794238] blkdev_ioctl+0x9b6/0x2020 [ 277.798121] ? blkpg_ioctl+0xc40/0xc40 [ 277.802003] ? lock_downgrade+0x8e0/0x8e0 [ 277.806153] ? rcu_is_watching+0x85/0x140 [ 277.810296] ? rcu_report_qs_rnp+0x790/0x790 [ 277.814719] ? __fget+0x40c/0x650 [ 277.818173] ? expand_files.part.8+0x9a0/0x9a0 [ 277.822746] ? trace_hardirqs_off+0xd/0x10 [ 277.826985] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 277.832086] block_ioctl+0xee/0x130 [ 277.835702] ? blkdev_fallocate+0x400/0x400 [ 277.840018] do_vfs_ioctl+0x1cf/0x16f0 [ 277.843900] ? rcu_pm_notify+0xc0/0xc0 [ 277.847781] ? ioctl_preallocate+0x2e0/0x2e0 [ 277.852181] ? fget_raw+0x20/0x20 [ 277.855620] ? putname+0xf2/0x130 [ 277.859061] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.864067] ? kmem_cache_free+0x25c/0x2d0 [ 277.868304] ? putname+0xf7/0x130 [ 277.871748] ? do_sys_open+0x3c3/0x740 [ 277.875630] ? security_file_ioctl+0x94/0xc0 [ 277.880037] ksys_ioctl+0xa9/0xd0 [ 277.883483] __x64_sys_ioctl+0x73/0xb0 [ 277.887365] do_syscall_64+0x1b1/0x800 [ 277.891243] ? finish_task_switch+0x1ca/0x840 [ 277.895731] ? syscall_return_slowpath+0x5c0/0x5c0 [ 277.900665] ? syscall_return_slowpath+0x30f/0x5c0 [ 277.905588] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 277.910948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.915785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.920963] RIP: 0033:0x455867 01:13:40 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x40004, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={0x9, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x0, 0x7, 0x2, 0x6, &(0x7f0000000040)='bcsf0\x00', 0x4460, 0x7ff, 0xdb}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x20000, 0x0) r2 = signalfd4(r1, &(0x7f00000001c0), 0x8, 0x0) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000200)=""/162, 0x3f}], 0x1) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x100000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) signalfd4(r2, &(0x7f0000000080), 0x8, 0x0) 01:13:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 277.924136] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.944272] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.951976] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 277.959232] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 277.966487] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 277.973745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 277.981021] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000000f [ 278.002824] FAT-fs (loop3): invalid media value (0x00) [ 278.008229] FAT-fs (loop3): Can't find a valid FAT filesystem [ 278.026138] QAT: Invalid ioctl [ 278.037212] QAT: Invalid ioctl [ 278.043690] QAT: Invalid ioctl 01:13:40 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x113002, 0x0) semget(0x2, 0x0, 0x300) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 01:13:40 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 278.050348] QAT: Invalid ioctl [ 278.055100] __ntfs_error: 11 callbacks suppressed [ 278.055110] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 278.067927] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 278.076527] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x8060000]}}, 0x1c) 01:13:41 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b830600040000000000010000700200000002000000008000000400"], 0x54) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0x0, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[], 0x0) 01:13:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:41 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) 01:13:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:41 executing program 4 (fault-call:5 fault-nth:16): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 278.353540] FAT-fs (loop3): invalid media value (0x00) [ 278.358963] FAT-fs (loop3): Can't find a valid FAT filesystem [ 278.359515] FAULT_INJECTION: forcing a failure. [ 278.359515] name failslab, interval 1, probability 0, space 0, times 0 [ 278.376585] CPU: 1 PID: 19051 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 278.383527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.392894] Call Trace: [ 278.395502] dump_stack+0x1b9/0x294 [ 278.399147] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.404359] should_fail.cold.4+0xa/0x1a [ 278.408439] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.413559] ? rcu_note_context_switch+0x710/0x710 [ 278.418501] ? graph_lock+0x170/0x170 [ 278.422297] ? __might_sleep+0x95/0x190 [ 278.426278] ? find_held_lock+0x36/0x1c0 [ 278.430343] ? __lock_is_held+0xb5/0x140 [ 278.434699] ? check_same_owner+0x320/0x320 [ 278.439017] ? graph_lock+0x170/0x170 [ 278.442838] ? rcu_note_context_switch+0x710/0x710 [ 278.447768] __should_failslab+0x124/0x180 [ 278.451994] should_failslab+0x9/0x14 [ 278.455792] kmem_cache_alloc_node+0x272/0x780 [ 278.460365] ? find_held_lock+0x36/0x1c0 [ 278.464684] __alloc_skb+0x111/0x780 [ 278.468452] ? skb_scrub_packet+0x580/0x580 [ 278.472771] ? rcu_is_watching+0x85/0x140 [ 278.476932] ? rcu_report_qs_rnp+0x790/0x790 [ 278.481344] ? netlink_has_listeners+0x2ff/0x4c0 [ 278.486143] ? netlink_tap_init_net+0x3c0/0x3c0 [ 278.490815] alloc_uevent_skb+0x89/0x220 [ 278.494868] kobject_uevent_env+0x866/0x1110 [ 278.499270] ? internal_create_group+0x347/0x970 [ 278.504035] kobject_uevent+0x1f/0x30 [ 278.507829] lo_ioctl+0x1346/0x1d10 [ 278.511454] ? lo_rw_aio_complete+0x430/0x430 [ 278.515940] blkdev_ioctl+0x9b6/0x2020 [ 278.519818] ? blkpg_ioctl+0xc40/0xc40 [ 278.523702] ? lock_downgrade+0x8e0/0x8e0 [ 278.527859] ? rcu_is_watching+0x85/0x140 [ 278.532000] ? rcu_report_qs_rnp+0x790/0x790 [ 278.536419] ? __fget+0x40c/0x650 [ 278.539885] ? expand_files.part.8+0x9a0/0x9a0 [ 278.544461] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 278.549559] block_ioctl+0xee/0x130 [ 278.553178] ? blkdev_fallocate+0x400/0x400 [ 278.557499] do_vfs_ioctl+0x1cf/0x16f0 [ 278.561393] ? ioctl_preallocate+0x2e0/0x2e0 [ 278.565815] ? fget_raw+0x20/0x20 [ 278.569255] ? putname+0xf2/0x130 [ 278.572698] ? rcu_read_lock_sched_held+0x108/0x120 [ 278.577714] ? kmem_cache_free+0x25c/0x2d0 [ 278.581947] ? exit_to_usermode_loop+0x87/0x310 [ 278.586618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.592145] ? security_file_ioctl+0x94/0xc0 [ 278.596559] ksys_ioctl+0xa9/0xd0 [ 278.600007] __x64_sys_ioctl+0x73/0xb0 [ 278.603906] do_syscall_64+0x1b1/0x800 [ 278.607784] ? finish_task_switch+0x1ca/0x840 [ 278.612270] ? syscall_return_slowpath+0x5c0/0x5c0 [ 278.617190] ? syscall_return_slowpath+0x30f/0x5c0 [ 278.622115] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 278.627474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.632312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.637503] RIP: 0033:0x455867 [ 278.640679] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.660066] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.667765] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 278.675029] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 278.682292] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.689550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 278.696809] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000010 01:13:41 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, &(0x7f0000001b00)='ns/user\x00') r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0xffffffffffffff9c, 0x7, 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000180)=0x8) sendmmsg$nfc_llcp(r2, &(0x7f0000001a80)=[{&(0x7f00000002c0)={0x27, 0x0, 0x2, 0x7, 0x800, 0x5, "1d39b034e60598f36623202388eeec28fc7ea301642a60d0ce62b036022d6f71a3bb5a8b52eef1e45c215e870697e2ab4b15da347d9759b6f023be019e9a2b", 0x32}, 0x60, &(0x7f0000001780)=[{&(0x7f0000000340)="0fd0ad5557dbb93e3a8692a30603658a9cdf926bf55f1dcdca5765ca15ff0cc1ccda44ca2f99767b511fd26854707138d1d602079d9f9d43b8533a9cb86c57c063b482b82489bbe01ba1c63ef1e0847935d0588c1ec305968bb87a0d26a6f74a0f401055bda15fdc813580556c1f0910c3afbff7263739c5fffce6e4fe320c96c2bef8", 0x83}, {&(0x7f0000000400)="50d2879111fcba9382f226200fcb9e28a7560d05e2eb5d7e0ce978fd8ebceb1768855e9da39a9d5a21dc0d179bc9a74b1b35a49b1abf4b35d11ef692cecd530243218b75dea9949a8e0c3e4d5b16993aef09e2296c7f7b4a782c96298d8144e3c916ffe7d3d66650dee039870474ae779e", 0x71}, {&(0x7f00000001c0)='d', 0x1}, {&(0x7f0000000480)="e47409299e8bdf7027324a747f0ec010349cedad7a3e1742efdbc5ad785b77300c746a465204223746937c58493a1c6ae742a5ce9b783cdde6711b7360ed116b773f835572bea79dc7105e3f920d995f1af3e94a157d8f02eaa7a0673872c533b52cbe46737903e91928ae30a8cc5de232111076798ec67ef27d606309ed28a2bcea86091917e21584d1f993a3a0e65698", 0x91}, {&(0x7f0000000540)="d7aea8cac770613c6df9456ae30ba8d61fb706f19f8bad5d0609e961a30a6ea668fe1eef0d0025a29068845e573c2bed4c394a2dfa73ee0aeb3e81aaa8103bf569829f69", 0x44}, {&(0x7f00000005c0)="05ff0b67bfa046661407620e9ef8f9144cb6081a7754122f9d9e1755cd224f68eaa76e16a2fddd100b22cf2274909c8c5b30af642e5663dc8c830f07b8d7d9fc76508424b4f4c5a8280211cd9ec6062e17d8445179c0a291dc43ccf788064fa7b73738b3d48d0b5bcc9ec72d227fd3bf92bd314d956aa9c52d2fa713745c41c88ce54e0594c3623515826c5ae52ae559c561dea1be056839b99149e2530b6ede78467cfa003127f8321dd24253d291ad8bf4dbb529bf90f72c5bbfdaf019eab2246e3d4cf7da830f0474043a632a83ebfa1c1c889b0ca8d5ec2d5054875f7dbd4fb3f391c2636ec9b065f1783e2f45caa2857f119d05b4c45b34fe10e9092420aa28d0ea3a688ea643488c2b40987ad34dd8879d79bc5ad9e9062d831d6a9722bca2c30dfd63b1913c861615e4890d67d070050cba3c9b3831e82fe6bd3d38e8a890d54a7feda299adaa79a2d5852bdb4098dbf9035d88603634415f28b460411e21ba6ebdf93bed0909d9f6850a4a3370cd361f86aaf35c39add84e31972d4b5e5abe95fb264f1ece57cd32f3e484741200655cc5a5f7fe23c2fdaa72271ac11f73d93919ee11dda4ffe34d058a51015ad18fb6176a196a9d00b84a7e30b902c9fe55c8c69437d07a81ce7d828de0fb1064014ae556f576f84f8981ca66142a8c61548e4dcec2d59332a0c9587178a66b7f5cbfeea4967fda26de7f3fbd21c32b058f6c3a40c19e4a654e15f2ff8ef61a3ecb70d09100aceb1bf634f50708db10bad1cc075cc803b009be3474bdf5457fc2abad6ea06d2038a5843505f18a330a61d88a6b1279c6267e217a14b7b027f293cf57f427fedd8f172c190b378230da4cff9b9a4ac49d679942e05722c9acf8263b31c2d028d88b205fa618d47235dadfe4d91d64bafe7e09cf4cdfce24897c0dbeedec5e02dba1dd5e860acce1fbc4972519508a4e1f01358f9b717856319964c553fabc80ed2070f66c53553108389384644323c6e608642edbca52f04bc0fa4cea33705964ff219542dac3556ce15e69950d488b0af964a96facb0c0da8c6a031393b6087b66dc15f3d4c64ff0ece77a5cf1169cc89dac693252d06aadb806bbb82ccb37eefa09403e2eddb1b365578ac34b54a00520ef555a5f78f302f72c426dd9b031b431015d4693f27a44f972546e11dd6a1e85291dc3654abc2cb88973768f1fd6d5fb248e0b8438d85b4fc27d0abf83cd42251b426cb2850bcf0961e97857f523ada4951c5f4aef44854ebc3338957461645fa2364330263c43a5e0ec9f16b89dece6adf08d8a17b6cc1951573ddb8ef8b0851b7f340b35a72193a0902977d9ea84534394b850d1ba755253d2834c35a989f7f9677c779e89a2d66fb30b0f367f0093e1b26072f79e4ea57e8f4710828e27bccd5488275e38686d46bb2f3b0546afccf70f1b97c671e04e66a41d02a594ac7a4a291a7e26c8aac27c9e92c60a803ac956f7e8620bd334ab0dce814d639bb26fc886c2cb0ed9c21766a1701940cb9954aa7120c074a37f644bbb903c9b85c5e7d2cab6b70b99e6c355324312a75c444563a85d80860ee73247f6adb751be213b4939810a122ff2991b324e9bc030b95d1c503874ba601b8adb2ef0d51ff9d4b662ca911c3f34c348fa69a2d803949909e3d83b34ba5a46a47d6a57b18f7ec36a082704443b3fa95fe9a94c64da6b87c7b2348b6c8e66826d923b2b733c77521e9523ecda197eb29b8d859553740e35aa56a08050e9d36482bb48d070ca35fd09622d922f97801a5b646b7ca6135e2f051b535e550859fdff92600bba892448e45c928194edf80b4413b99ed98293b41d71b77d70af2f013d46e1e1b58cf0899ef731c13b5357932ff7f802f1a7c89ad4040b6186217bba2181fcafb8a54ac4fdfd191ed1804f30ea685f4f474416eca1fcc69f7c07fc86ce3eb12359af6ffaf1ae95fb2eeb33c7eded002278ef3fb92a7b88675fbcc6944924de7da23cc650a8b376afb168bd5748cc4808a007d42ad514a95e8497842d369c687a7f432119c227a63d86f1e612cf17f4fa7788657ae7f914ab3c1d968e6bdcf368d0321c90a30a1fe610785d6fe4570b932097ea1be83bf56ddb1e9fcd6fcfc61a09b4d96dd7e099d0a78c2d78446e5a5e890db61caaf9f0b8a9e6639a6cb3a1470a9ec3e44b854f5f93fc2aed9e90bcd7e5a40e778c7814e3534e624a5e169705d4830b8aae84ed2e1bf9520570f052f018348d846a5157a4b9d9a1fc12be3f098580cf8468288d32c0be89e800dcb037b4ff5417bb0d19b0e543619d968e8561f4dbf19136cb1744c545b1be026cd0772edae93950e897f807011fdfd4bc6f4e8614a1ae81b13d5476387fdefaeb94f8be6dd51afb1ad3362455e822a3035d84a326ccbbfda0ca606a1d7e488369df7b21dc87667d6b8527c394d9195ac5c5ab4b35aaa0c3217a1fbe6c0f2faa9e2a8e2800ec7aacf34293a17094e84a1347e0b2196ca17eb3cd12ad10e2e7c7d8719f1d9d4ee351b01bce8b01d2d2f6afc50cee08d12125d2fd35f3e88fc28315ff062176268b967f10bcedf97f987fd9bb2f135cf72d0daf64effcd101fed8e4abea7ae2b8b6e04f053e18ef5dd4c1b8c1c2ba4d3196e798e3863b3af3fd607e3be51ce3afd49fbb87e23b1abc887b61e86ac0d94838734e8ead9edd4ea5b1502d5fe387900e03ee4987f4f446ef05e34e85041e63883082aad24b5e954ed7ccbf61f54eae76b38d13c375f2f2a05ff69a4d9d0932d3181538a4b77385d28a0353a5c8ba126eb7c33f476767a44c86348c392a91d679151366b312f75bc6065be83d9a8aefd51b4c89d9db84005954881ccdcbee51942d23a3f3fc5fc8ddb4931be8e7874442b5271151aa313e19843053f0e23fb7100bf8eda1c07213a2eaeba93d955382b91a397d3a528977fb9f777dd0393d06c995b56620354b6963ef8a6ddcc6fd77e068031d400e9c9f70cd9effb59f545090977a1faccb4668a1421b164acf7069dc90d7508d6c9fd55fb002c54583e0c7fa59ef1a1adf65075a193738cd0fcf51d4b18831e2fc0128adbc485501e2ef123f93f11d658046fab6e058d466b992a2ced9882663abed5ba70d16d644e1c4d3179e41bfd382fedaf37d102e4f4cf220eee131c61ee718111c6110644780ba4b4939ce08048c1926a6b956acba1414ca2761ac0b6eb532d7308375a96e523c39718759a0ff125b63fb44e981db3aa0094daf0159c748e4816ce11217bf0eb44242e280887c6f2879c18264ab75cd6aa5357c901fb136998b6e67af97f4733ff446da94593ca661b92199ca06a6d125b8b3bdd8490891c933b477376b1ff6339ff6943515ca50f08467493e3d1d53ed37a140b249abad9e185f5008280452a1918fae8d0c4376fc615874b009e6bbaa6c5e7a6aac08145efe8633d5674c2907fc5e8315772eb4feff00916833d0e49ba6f38e982f3654dd1bbb6ea11a8eb3eb288a66bd0f629d9febbc2648fbf228919973d22623faed3e875654657bef28942a933c70df65fb36bec26c8e6f48cf11c84f378256fdf8d2092b8a07dcb1d9779cfba90c7e57cc4a80aefd43d69fbd01b2ecfe9a1d15f104fbc3f1df361ee46d732262e8a6113bceb70b6f34b7e0792022fa0621c8f0e31375fff50e9dd607a3e3ba48e34331a8926091c950ed317f62141092636e35c1a7bb0daab697d19522bae5d761cb466759a6e847921f52a63b75541da687bffc8f0a08979d2f1f5c0afe42992d54091dc040024afa45be58d55aabc92bc85eccedf700d0f2814324c2730113e18ae1547ec2ed11a1b12e4aa1e86462a15685cb536ecd9e901dd224352b3d6eae44fb7cbd7f5dd785eceaff1dc7b861b64a7c0173fe9cbeeb8e7fd3f08cf363ed410260f498a18e8d338abe7968db1c6e52db6624e37a0bc28f5238e1505b4055e7d643f289e9845f6d95437c457584d06f2a4527f28ec4d387b8639118512dbd6d9f14ccf879d3202e8210045b545429068e294ceb181bd47b389ac5695bc90e26550909ba2e56a2c9b1ead1ca45665451f8637fc2e30773be3f6eb8d39b693263809024a2fff62b91d2719f6f69e63028142ae9c688fb5f522e06e97d57d5a522f6e776508c6c4312fc8a013f7ad2b9de8aa3a82fa8b2e1eeb8fd4c1b344022686fc0860f91cad6985269dc7631d95cea1bab873239247cc1a861e9977c9a776ba7764fbab80bdcad70bf5cd76cf0b759f299951cd066008a3f8b91ac75466dfac07863cb724dc8d249293f4e065d0ff556615e7bcc76f5d95c92bad8ecf1939d06d9662475e23e9374edded4def4708b3cb45faef88b9eed21816b06ac3393320dc930e318d7c0c5b049fd04ea7751b85bdd9c234dde4e0f57173b9898c4338e02c4e80e57a78b1c4b496315a1de1f0b1f28123545363253a22986cd7351e5ac1e42e42ebf27de127c4020a5d136874855858be794de2d4a753fe5c1d2518d4264e3e2f535bcb240cc4e29e383799e96050a5d75469b091a199f6dbb885e16ea871c033af8f89f136d1b125dad98af5729167b94ba4862a72e7524c24d92a5a2517552707acc44cf68e3d63eb52221376836805751553afb097bbe9f719944c177b3da9767caacbee214e53d75a10eccc7ae70649c64ce0cf70c9d4061e8e7f14ad4234b8d6d282324fe7a1f3a8d481868594833c2060010b8a9181c428d396b08f934bd857d7789ec3e482467637d103480c8cca204653f98a0d5f067d8b8541850763db1da11d9cdd18017b406170ff426a862191936dd542d9abf55f6c6f64f12b1fcb9a4a4c8961e6ffc5144c110f1453573f393af96750d5872d38fa3265d227e05bbb40daf5b7a9a3a15fb581b6cb0cefb100938ebdb91b885ac929ff39f0ec48bcce964bb04eb6ab322dcaf0e4e07dfe7426bb7de8226eeaec7e0fc30e74db87b8be5d93419cde48ea97ebbbacd3b3cda6bda1e72d651612d145b44181fde870dc3956837860bbb39712a78cf6420e2824949b865bc2f2f1a7d97097d8d4dbd022f72fd2076d382cf1abed2039dd1075d70092ed0840e96f6b9b2f9ef8eb713013f9fb470d01480840cfae62b049d1604238507b6157debbe6bd55d3e89974c3b196bd7af69d7eedc4e77ce0eb576cb42b4a7b46e6b87a96c0947a31de95b4a1d4557adabca330178b3c58203aaafc0a9875891c54a02241b2fe576cfd922294d4ab3595fe0731143e92447ff04fa46cbe309c364c6971332ff498a5adf54bf25a29c2683343ea75963cc9ebe1cb24409c1ff3c07e48bb9de040888ce5133359f0e207e331fa2cbbfe44e2952b673354d5ab8304f74fe8fb7e036c01f9db03071961e1aeac1ff34e5a7b2f14a227c54cea8cdaf81d7f3c74397871500ec685adb7be95c2680ce8cddb32def329408e1774a91192b969a96d061bf612479ef428129b5d996b35b4c4c19daea61250f0f6557799abdeb8eb3f11e50bc5ededf347dced043eacbfbba615f7aa124ecf9fce89fe878cebb071850c5356818e3d9c259afdccbd86de5a6e4fa51600c76328e0d2345686554e34f4406ec308afdde6c4627ffe27e0492278c7eadf5ab4fa1eecc52aff3f1ffb563791ba279604f7a38f8a5f5e2913646aec73916587f8188b6d83fd9797bb0cefefc502ac2eed0cdaffdae66c8d32654880a22c6187a1386a62832bdb6f44177159f4e887487743478f00267678cca0f38a4b338512dcf6bab407bcf09f67c7984e17746a69159e60821b70d89b46d41a7e92047966307cb4f9c47", 0x1000}, {&(0x7f00000015c0)="de4d6e7d54beaf5dd6804d846d5d24c632f97a283f4f1c7a2f5fb5caad5b4727afe7148861a75ef30a40ac1cd2fbbfb121c9a6c8251b9720217ec0627ec68735ff1afa1538f869f72e72aafb2b5b9d09eea23ed6330e973906eaea363362deac50e703db6097f340efc38a33cdacd7b53879d4675c3fec18352713e38fcb2eb6f7fcef509261dceb7e439cdc0837295f5cc9ee92b1f1e9b12ed71abcec9f59634d19e0b3b80fdd3342dacca5fb30ed8444aeb247b1c1d32d6d9d91773756402b12d64a6fb8f09995", 0xc8}, {&(0x7f00000016c0)="3dd4f0dc8b1d966753bbffc496877981bb005bf9c6cc2e23dd4138ee3d9331818e914edda2533e3423d3e8ad1605c2449df0ca20f3156e402620abf1a915e7973d6a5ebdc566e781192e61a2e801134ab59ade258e743a31883209750f3b17e08f2761cc7631e8ae1cf9301398a81586947ac5a0aa41881490ea5fad30970c89d89bdd6823aeb5cea7d8c966e79b8c37542246bc74c99f89380f37f3", 0x9c}], 0x8, &(0x7f0000001800)={0xc0, 0x11c, 0x1, "334ff53b825566fed2ef8b474795a1c72dc686adfb4bf6145c90b15f0f1981f2b750b00d0201d8783f857cf1aff81b63e23e57e75a0294089a746cc86a32d033c0c5ad0970e9aa7469dac9409952d927fef74e9ef25d2a4c09d79e3638bf2fa5fdd7ee66e544e5938b0927a0cf7d1c4ccbcdd6a23df6d6f3b9b3a551dc570275d2a47b4e47bc14b93867d127561d030d321f24127005d68ff39b9f30e9c63bc2c93143720923296e3d669d"}, 0xc0, 0x4004004}, {&(0x7f00000018c0)={0x27, 0x0, 0x1, 0x2, 0x6, 0x80000001, "77ba2a01fc8fb531d32a5fafcabb7a0aa743949fd8d975e2103002fb244bfb9678c3be1cd9bbc1806a82a7c21ab2775e546da01b68c0d9c8a610eb5c753495", 0x36}, 0x60, &(0x7f0000001a40)=[{&(0x7f0000001940)="4af8685f488f52e11dcd1cc9b676db5738950f337c08f0491905317482736ae01afa9e9a5a39164def2160ec7f3ecdd64b75bb19d40f205ca14a5fad34a83687a0f6d1cbad8f5a363bb627853e2f99a3cdec2fbb1ff59038cb5164888270944150ff2c470bdf7dbec0536bcdf1b0a552ffb42a71e2288ab459818997e15f3398beac9bccb655e4e1f740dda268072af1df5bfb9d86328121dc07fbc066432e4228380a20fb1b967c137190f031481e9f6312bb3d1b8ba21b23d5f9be9915daad448314a1d1351bac887c7c6e9fed59d625e898a0d5ea676cb3bd2b2cdc433732a77718841453ad9d7f7a", 0xea}], 0x1}], 0x2, 0x10) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x19) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000140)={0x7fffffff, 0xff, 0x4}) 01:13:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x6488]}}, 0x1c) [ 278.705812] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 278.713751] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 278.722365] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0x0, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:41 executing program 4 (fault-call:5 fault-nth:17): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0x0, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0) [ 278.930506] FAULT_INJECTION: forcing a failure. [ 278.930506] name failslab, interval 1, probability 0, space 0, times 0 [ 278.941878] CPU: 1 PID: 19074 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 278.948815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.958182] Call Trace: [ 278.960790] dump_stack+0x1b9/0x294 [ 278.964447] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.969659] ? perf_trace_lock_acquire+0xe3/0x980 [ 278.974518] ? __mutex_unlock_slowpath+0x180/0x8a0 01:13:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:41 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 278.979478] should_fail.cold.4+0xa/0x1a [ 278.983567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.988684] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 278.993642] ? graph_lock+0x170/0x170 [ 278.997472] ? find_held_lock+0x36/0x1c0 [ 279.001562] ? __lock_is_held+0xb5/0x140 [ 279.005653] ? check_same_owner+0x320/0x320 [ 279.009994] ? rcu_note_context_switch+0x710/0x710 [ 279.014947] __should_failslab+0x124/0x180 [ 279.019200] should_failslab+0x9/0x14 [ 279.023015] kmem_cache_alloc_trace+0x2cb/0x780 [ 279.027706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.033259] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 279.038133] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 279.043004] ? device_create_file+0x1e0/0x1e0 [ 279.047520] kobject_uevent_env+0x20f/0x1110 [ 279.051964] ? internal_create_group+0x347/0x970 [ 279.056745] kobject_uevent+0x1f/0x30 [ 279.060570] lo_ioctl+0x1346/0x1d10 [ 279.064226] ? lo_rw_aio_complete+0x430/0x430 [ 279.068733] blkdev_ioctl+0x9b6/0x2020 [ 279.072651] ? blkpg_ioctl+0xc40/0xc40 [ 279.076563] ? lock_downgrade+0x8e0/0x8e0 01:13:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0) [ 279.080739] ? rcu_is_watching+0x85/0x140 [ 279.084906] ? rcu_report_qs_rnp+0x790/0x790 [ 279.089339] ? __fget+0x40c/0x650 [ 279.092814] ? expand_files.part.8+0x9a0/0x9a0 [ 279.097426] ? trace_hardirqs_off+0xd/0x10 [ 279.101673] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 279.106800] block_ioctl+0xee/0x130 [ 279.110444] ? blkdev_fallocate+0x400/0x400 [ 279.114778] do_vfs_ioctl+0x1cf/0x16f0 [ 279.118670] ? rcu_pm_notify+0xc0/0xc0 [ 279.122577] ? ioctl_preallocate+0x2e0/0x2e0 [ 279.127608] ? fget_raw+0x20/0x20 [ 279.131071] ? putname+0xf2/0x130 [ 279.134536] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.139573] ? kmem_cache_free+0x25c/0x2d0 [ 279.143825] ? putname+0xf7/0x130 [ 279.147291] ? do_sys_open+0x3c3/0x740 [ 279.151192] ? security_file_ioctl+0x94/0xc0 [ 279.155615] ksys_ioctl+0xa9/0xd0 [ 279.159084] __x64_sys_ioctl+0x73/0xb0 [ 279.162982] do_syscall_64+0x1b1/0x800 [ 279.166877] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 279.171728] ? syscall_return_slowpath+0x5c0/0x5c0 [ 279.176674] ? syscall_return_slowpath+0x30f/0x5c0 [ 279.181623] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 279.187011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.191880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.197074] RIP: 0033:0x455867 [ 279.200259] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.219639] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.227345] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 279.234603] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 279.241860] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.249120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 279.256378] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000011 [ 279.294562] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 279.302577] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 279.311187] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:42 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b83060004000000000001000070020000000200000000800000"], 0x52) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0xc0ffffff00000000]}}, 0x1c) 01:13:42 executing program 4 (fault-call:5 fault-nth:18): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = signalfd4(r0, &(0x7f0000000140), 0x21f, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x10000000000000af) signalfd4(r1, &(0x7f0000000080), 0x8, 0x0) 01:13:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0) 01:13:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) [ 279.804400] FAULT_INJECTION: forcing a failure. [ 279.804400] name failslab, interval 1, probability 0, space 0, times 0 [ 279.815791] CPU: 1 PID: 19119 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 279.822729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.832091] Call Trace: [ 279.834699] dump_stack+0x1b9/0x294 [ 279.838350] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.843567] should_fail.cold.4+0xa/0x1a [ 279.847649] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.852769] ? rcu_note_context_switch+0x710/0x710 [ 279.857721] ? graph_lock+0x170/0x170 [ 279.861535] ? __might_sleep+0x95/0x190 [ 279.865522] ? find_held_lock+0x36/0x1c0 [ 279.869590] ? __lock_is_held+0xb5/0x140 [ 279.873662] ? check_same_owner+0x320/0x320 [ 279.877978] ? graph_lock+0x170/0x170 [ 279.881774] ? rcu_note_context_switch+0x710/0x710 [ 279.886704] __should_failslab+0x124/0x180 [ 279.890933] should_failslab+0x9/0x14 [ 279.894735] kmem_cache_alloc_node+0x272/0x780 [ 279.899309] ? find_held_lock+0x36/0x1c0 [ 279.903367] __alloc_skb+0x111/0x780 [ 279.907073] ? skb_scrub_packet+0x580/0x580 [ 279.911397] ? rcu_is_watching+0x85/0x140 [ 279.915551] ? rcu_report_qs_rnp+0x790/0x790 [ 279.919965] ? netlink_has_listeners+0x2ff/0x4c0 [ 279.924713] ? netlink_tap_init_net+0x3c0/0x3c0 [ 279.929378] alloc_uevent_skb+0x89/0x220 [ 279.933433] kobject_uevent_env+0x866/0x1110 [ 279.937831] ? internal_create_group+0x347/0x970 [ 279.942599] kobject_uevent+0x1f/0x30 [ 279.946395] lo_ioctl+0x1346/0x1d10 [ 279.950025] ? lo_rw_aio_complete+0x430/0x430 [ 279.954515] blkdev_ioctl+0x9b6/0x2020 [ 279.958394] ? blkpg_ioctl+0xc40/0xc40 [ 279.962272] ? lock_downgrade+0x8e0/0x8e0 [ 279.966430] ? rcu_is_watching+0x85/0x140 [ 279.970569] ? rcu_report_qs_rnp+0x790/0x790 [ 279.974981] ? __fget+0x40c/0x650 [ 279.978431] ? expand_files.part.8+0x9a0/0x9a0 [ 279.983004] ? trace_hardirqs_off+0xd/0x10 [ 279.987238] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 279.992336] block_ioctl+0xee/0x130 [ 279.995952] ? blkdev_fallocate+0x400/0x400 [ 280.000263] do_vfs_ioctl+0x1cf/0x16f0 [ 280.004137] ? rcu_pm_notify+0xc0/0xc0 [ 280.008027] ? ioctl_preallocate+0x2e0/0x2e0 [ 280.012430] ? fget_raw+0x20/0x20 [ 280.015869] ? putname+0xf2/0x130 [ 280.019311] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.024317] ? kmem_cache_free+0x25c/0x2d0 [ 280.028541] ? putname+0xf7/0x130 [ 280.031986] ? do_sys_open+0x3c3/0x740 [ 280.035872] ? security_file_ioctl+0x94/0xc0 [ 280.040274] ksys_ioctl+0xa9/0xd0 [ 280.043723] __x64_sys_ioctl+0x73/0xb0 [ 280.047607] do_syscall_64+0x1b1/0x800 [ 280.051489] ? finish_task_switch+0x1ca/0x840 [ 280.055975] ? syscall_return_slowpath+0x5c0/0x5c0 [ 280.060908] ? syscall_return_slowpath+0x30f/0x5c0 [ 280.065833] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 280.071190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.076036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.081226] RIP: 0033:0x455867 [ 280.084399] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.103774] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.111476] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 280.118731] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 280.125990] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 280.133250] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 280.140507] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000012 01:13:42 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x89060000]}}, 0x1c) [ 280.158495] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 280.175896] FAT-fs (loop0): bogus number of reserved sectors [ 280.181915] FAT-fs (loop0): Can't find a valid FAT filesystem 01:13:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:42 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x4000, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 01:13:43 executing program 4 (fault-call:5 fault-nth:19): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:43 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x4000000]}}, 0x1c) [ 280.434554] FAULT_INJECTION: forcing a failure. [ 280.434554] name failslab, interval 1, probability 0, space 0, times 0 [ 280.445972] CPU: 0 PID: 19157 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 280.452909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.462270] Call Trace: [ 280.464856] dump_stack+0x1b9/0x294 [ 280.468481] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.473668] ? perf_trace_lock_acquire+0xe3/0x980 [ 280.478511] should_fail.cold.4+0xa/0x1a [ 280.482567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.487659] ? rcu_note_context_switch+0x710/0x710 [ 280.492580] ? graph_lock+0x170/0x170 [ 280.496367] ? __might_sleep+0x95/0x190 [ 280.500336] ? find_held_lock+0x36/0x1c0 [ 280.504393] ? __lock_is_held+0xb5/0x140 [ 280.508456] ? check_same_owner+0x320/0x320 [ 280.512772] ? graph_lock+0x170/0x170 [ 280.516564] ? rcu_note_context_switch+0x710/0x710 [ 280.521490] __should_failslab+0x124/0x180 [ 280.525716] should_failslab+0x9/0x14 [ 280.529506] kmem_cache_alloc_node+0x272/0x780 [ 280.534097] ? find_held_lock+0x36/0x1c0 [ 280.538168] __alloc_skb+0x111/0x780 [ 280.541877] ? skb_scrub_packet+0x580/0x580 [ 280.546192] ? rcu_is_watching+0x85/0x140 [ 280.550330] ? rcu_report_qs_rnp+0x790/0x790 [ 280.554740] ? netlink_has_listeners+0x2ff/0x4c0 [ 280.559488] ? netlink_tap_init_net+0x3c0/0x3c0 [ 280.564152] alloc_uevent_skb+0x89/0x220 [ 280.568206] kobject_uevent_env+0x866/0x1110 [ 280.572621] ? internal_create_group+0x347/0x970 [ 280.577376] kobject_uevent+0x1f/0x30 [ 280.581170] lo_ioctl+0x1346/0x1d10 [ 280.584794] ? lo_rw_aio_complete+0x430/0x430 [ 280.589279] blkdev_ioctl+0x9b6/0x2020 [ 280.593156] ? blkpg_ioctl+0xc40/0xc40 [ 280.597039] ? lock_downgrade+0x8e0/0x8e0 [ 280.601183] ? kasan_check_read+0x11/0x20 [ 280.605321] ? rcu_is_watching+0x85/0x140 [ 280.609458] ? rcu_report_qs_rnp+0x790/0x790 [ 280.613866] ? __fget+0x40c/0x650 [ 280.617317] ? expand_files.part.8+0x9a0/0x9a0 [ 280.621890] ? trace_hardirqs_off+0xd/0x10 [ 280.626115] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 280.631223] block_ioctl+0xee/0x130 [ 280.634841] ? blkdev_fallocate+0x400/0x400 [ 280.639150] do_vfs_ioctl+0x1cf/0x16f0 [ 280.643032] ? rcu_pm_notify+0xc0/0xc0 [ 280.646913] ? ioctl_preallocate+0x2e0/0x2e0 [ 280.651317] ? fget_raw+0x20/0x20 [ 280.654757] ? putname+0xf2/0x130 [ 280.658198] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.663202] ? kmem_cache_free+0x25c/0x2d0 [ 280.667426] ? putname+0xf7/0x130 [ 280.670871] ? do_sys_open+0x3c3/0x740 [ 280.674753] ? security_file_ioctl+0x94/0xc0 [ 280.679151] ksys_ioctl+0xa9/0xd0 [ 280.682596] __x64_sys_ioctl+0x73/0xb0 [ 280.686476] do_syscall_64+0x1b1/0x800 [ 280.690352] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 280.695197] ? syscall_return_slowpath+0x5c0/0x5c0 [ 280.700128] ? syscall_return_slowpath+0x30f/0x5c0 [ 280.705051] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 280.710407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.715259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.720435] RIP: 0033:0x455867 [ 280.723606] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.742987] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.750690] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 280.757947] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 280.765202] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 280.772467] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 280.779724] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000013 01:13:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0xff) 01:13:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:44 executing program 4 (fault-call:5 fault-nth:20): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:44 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"037ba9d64c46fad0fed9a5e14d4497b61b1f831a6f33105b40508a285b817a01d32ff90be100f7479152f714fcb5c402e55634300ca8eb54eec504761a97c2ab50810468ba4ecbf4ab97a939196fc1b63d9706364d2c4836bacaba0b4fc91ce750cd8064fa47f77885c9428af5d06009cce1263924f06dfb864e72e959894e0a6cab68d3a540dbde215a8fea403a2c6f23476a91c5acd28b143d335e4a2e71cc26f69993acfb6267a404f99ebb4fc53be6ae465ad52eb97e0033c019de5adba7c0d3bb4b73c51f98c7501a45be084a5b6f02612baaa81690bb0c832daa0d2f768da3a65130ef0140028f78fb41ae01f8bd590c7465bbd20a3f1f65169b84c47d46a691c479de5e7cd60d6601756f19e552aeb138a143fdef9112cadfddffea3ed52856049a94f89068e41f42f0492bd7e0b8dfc8df68597f517524ba4823321fdf75af58626de6a32aa4c2046af37f71bd42e7de082e2144819d6be27f70bef673c1849bb2ba24e0afbf0deb56a5050b7cadc3d887139712a0ffb7bd5f82e13dd05ecdeb650f45c1e26f548f19403eba3164a11965481597f9d10a4bf85a26ae7a10d9d9999e577ff9b9c92ba16af2905c53836dc52265f8a8a8ac325ed60fbc4533505454fd613dd8fce35bc7c32e49c76f7927c3b829c81bfcf745c47aeedbdeb6a34c4cef5582b1cc3a6a106181f87d4310a553cbbcc7eb87422277fc36ab9f7ae1025c3662ef6c6ce7113e1ab12919e5a4cfd80cc2486177731c0a98d684055f97a4ac8be41e2d999588b84e39c6c817ab20df241332c570f86c7628649d770cef9a93403f32efd99217aa67422e0238032e5460dafef7d124aa3f508982ed6718342503fe201d267fb8271626d915f7dcf3cfc215653139e7686cd0a7d83a76b9a4d87e5a29659714b3722384c693058fd99350633387e7e56f26dbeb8f3b36cd5c68313cc02fa20a23bbb910644580462605e2d41249b4c518f5be51435eddb87db4bd9aebc1eb33a102bee0db9e6c6c7444c2f8e88b4be53ce416cd9bf430431f689f974a23aae63880f0e91123494868f91e7b69c0e42a8599822ea8ef17d6bda0b63260cbe526fd713d381c59e6d4b63016b562222d86c56c1ac271fcd4311895f8a489987cbd322455f34687668b424cc31b9f2ab0c63f95e8c5c6696e68dc10e06515c13d6c3a1a782121f683815556664a7f5255f02d9b6fe489d494fd7d0cb3dcb00b5ed29a195935db319e9fb97723f29032e8055db81155fc026cfb7688c7537d4a517cd8b198a78891193e990d32feac9f89525cd6a542643c425df2477af48ed849ec5062a64da9d22215d68a8975bd5d9a848a9479b08425ca1cf9e02ac384d1579f1bbdfac9cef021b53f904ccf3aea78a99223e4fbb03a6c57d1848983db57e0dbff7d23d0ffff9549a9677d36901b2df6de92a69f64"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b83060004000000000001000070020000000200000000800000"], 0x52) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:44 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffff9, 0x36200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x2710, 0x1, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 01:13:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x86ddffff]}}, 0x1c) [ 281.392704] FAT-fs (loop0): bogus number of reserved sectors [ 281.398639] FAT-fs (loop0): Can't find a valid FAT filesystem [ 281.404133] FAULT_INJECTION: forcing a failure. [ 281.404133] name failslab, interval 1, probability 0, space 0, times 0 [ 281.415908] CPU: 0 PID: 19192 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 281.422841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.432211] Call Trace: [ 281.434816] dump_stack+0x1b9/0x294 [ 281.438469] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.443685] should_fail.cold.4+0xa/0x1a [ 281.447759] ? rcu_report_qs_rnp+0x790/0x790 [ 281.452183] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.457308] ? graph_lock+0x170/0x170 [ 281.461120] ? kernel_text_address+0x79/0xf0 [ 281.465534] ? __unwind_start+0x166/0x330 [ 281.469700] ? find_held_lock+0x36/0x1c0 [ 281.473775] ? __lock_is_held+0xb5/0x140 [ 281.477862] ? check_same_owner+0x320/0x320 [ 281.482199] ? blkdev_ioctl+0x9b6/0x2020 [ 281.486270] ? block_ioctl+0xee/0x130 01:13:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x2) 01:13:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)) [ 281.490088] ? rcu_note_context_switch+0x710/0x710 [ 281.495027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.500415] __should_failslab+0x124/0x180 [ 281.504667] should_failslab+0x9/0x14 [ 281.508477] kmem_cache_alloc+0x2af/0x760 [ 281.512648] skb_clone+0x1ed/0x4f0 [ 281.516202] ? refcount_add_not_zero+0x280/0x320 [ 281.520973] ? skb_split+0x11d0/0x11d0 [ 281.524875] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.529904] ? netlink_trim+0x1b2/0x370 [ 281.533896] ? netlink_skb_destructor+0x210/0x210 01:13:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)) [ 281.538759] netlink_broadcast_filtered+0x1024/0x1580 [ 281.543969] ? __netlink_sendskb+0xd0/0xd0 [ 281.548216] ? pointer+0x930/0x930 [ 281.551775] ? rcu_is_watching+0x85/0x140 [ 281.555942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.561492] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 281.566263] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.571284] netlink_broadcast+0x3a/0x50 [ 281.575347] kobject_uevent_env+0x829/0x1110 [ 281.579749] ? internal_create_group+0x347/0x970 [ 281.584513] kobject_uevent+0x1f/0x30 [ 281.588306] lo_ioctl+0x1346/0x1d10 [ 281.591931] ? lo_rw_aio_complete+0x430/0x430 [ 281.596414] blkdev_ioctl+0x9b6/0x2020 [ 281.600316] ? blkpg_ioctl+0xc40/0xc40 [ 281.604210] ? lock_downgrade+0x8e0/0x8e0 [ 281.608354] ? rcu_is_watching+0x85/0x140 [ 281.612494] ? rcu_report_qs_rnp+0x790/0x790 [ 281.616898] ? retint_kernel+0x10/0x10 [ 281.620778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 281.625801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 281.630550] ? retint_kernel+0x10/0x10 [ 281.634447] block_ioctl+0xee/0x130 [ 281.638098] ? blkdev_fallocate+0x400/0x400 [ 281.642413] do_vfs_ioctl+0x1cf/0x16f0 [ 281.646288] ? rcu_pm_notify+0xc0/0xc0 [ 281.650167] ? ioctl_preallocate+0x2e0/0x2e0 [ 281.654566] ? fget_raw+0x20/0x20 [ 281.658047] ? putname+0xf2/0x130 [ 281.661499] ? rcu_read_lock_sched_held+0x108/0x120 [ 281.666504] ? kmem_cache_free+0x25c/0x2d0 [ 281.670738] ? putname+0xf7/0x130 [ 281.674185] ? do_sys_open+0x3c3/0x740 [ 281.678072] ? security_file_ioctl+0x94/0xc0 [ 281.682474] ksys_ioctl+0xa9/0xd0 [ 281.685922] __x64_sys_ioctl+0x73/0xb0 [ 281.689799] do_syscall_64+0x1b1/0x800 [ 281.693676] ? finish_task_switch+0x1ca/0x840 [ 281.698162] ? syscall_return_slowpath+0x5c0/0x5c0 [ 281.703093] ? syscall_return_slowpath+0x30f/0x5c0 [ 281.708021] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 281.713383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.718220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.723399] RIP: 0033:0x455867 01:13:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x40030000000000]}}, 0x1c) [ 281.726574] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.745950] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.753652] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000455867 [ 281.760918] RDX: 0000000000000015 RSI: 0000000000004c00 RDI: 0000000000000016 [ 281.768176] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.775431] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 281.782685] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000014 01:13:44 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)) 01:13:44 executing program 4 (fault-call:5 fault-nth:21): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x17e) 01:13:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x608]}}, 0x1c) [ 281.958006] FAT-fs (loop0): bogus number of reserved sectors [ 281.963982] FAT-fs (loop0): Can't find a valid FAT filesystem [ 281.972232] FAULT_INJECTION: forcing a failure. [ 281.972232] name failslab, interval 1, probability 0, space 0, times 0 [ 281.983894] CPU: 0 PID: 19216 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 281.990834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.000189] Call Trace: [ 282.002778] dump_stack+0x1b9/0x294 [ 282.006408] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.011598] ? print_usage_bug+0xc0/0xc0 [ 282.015663] should_fail.cold.4+0xa/0x1a [ 282.019715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.025244] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.030341] ? graph_lock+0x170/0x170 [ 282.034131] ? debug_check_no_locks_freed+0x310/0x310 [ 282.039314] ? find_held_lock+0x36/0x1c0 [ 282.043370] ? __lock_is_held+0xb5/0x140 [ 282.047429] ? check_same_owner+0x320/0x320 [ 282.051759] ? rcu_note_context_switch+0x710/0x710 [ 282.056677] ? lock_downgrade+0x8e0/0x8e0 [ 282.060819] __should_failslab+0x124/0x180 [ 282.065048] should_failslab+0x9/0x14 [ 282.068838] kmem_cache_alloc+0x2af/0x760 [ 282.072975] ? rcu_report_qs_rnp+0x790/0x790 [ 282.077377] __d_alloc+0xc0/0xd30 [ 282.080824] ? shrink_dcache_for_umount+0x290/0x290 [ 282.085831] ? d_alloc_parallel+0x1e70/0x1e70 [ 282.090319] ? lock_release+0xa10/0xa10 [ 282.094283] ? mark_held_locks+0xc9/0x160 [ 282.098417] ? filename_create+0x1aa/0x5a0 [ 282.102640] ? d_lookup+0x254/0x330 [ 282.106259] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 282.111261] ? d_lookup+0x219/0x330 [ 282.114878] d_alloc+0x8e/0x370 [ 282.118146] ? __d_lookup+0x9c0/0x9c0 [ 282.121943] ? __d_alloc+0xd30/0xd30 [ 282.125661] __lookup_hash+0xd9/0x190 [ 282.129465] filename_create+0x1dd/0x5a0 [ 282.133524] ? kern_path_mountpoint+0x40/0x40 [ 282.138011] ? fget_raw+0x20/0x20 [ 282.141459] ? putname+0xf2/0x130 [ 282.144900] ? getname_flags+0xd0/0x5a0 [ 282.148869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.154391] ? getname_flags+0x26e/0x5a0 [ 282.158444] do_mkdirat+0xd2/0x2f0 [ 282.161974] ? __ia32_sys_mknod+0xb0/0xb0 [ 282.166112] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 282.170952] ? ksys_ioctl+0x81/0xd0 [ 282.174575] ? do_syscall_64+0x92/0x800 [ 282.178538] __x64_sys_mkdir+0x5c/0x80 [ 282.182588] do_syscall_64+0x1b1/0x800 [ 282.186461] ? finish_task_switch+0x1ca/0x840 [ 282.190946] ? syscall_return_slowpath+0x5c0/0x5c0 [ 282.195862] ? syscall_return_slowpath+0x30f/0x5c0 [ 282.200788] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 282.206144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.211066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.216241] RIP: 0033:0x454e37 [ 282.219416] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.238772] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 282.246472] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 01:13:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0xff) [ 282.253727] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 282.260982] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 282.268242] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 282.275501] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000015 01:13:45 executing program 4 (fault-call:5 fault-nth:22): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 282.437293] FAULT_INJECTION: forcing a failure. [ 282.437293] name failslab, interval 1, probability 0, space 0, times 0 [ 282.448630] CPU: 0 PID: 19235 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 282.455655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.465009] Call Trace: [ 282.467609] dump_stack+0x1b9/0x294 [ 282.471247] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.476443] ? perf_trace_lock_acquire+0xe3/0x980 [ 282.481298] should_fail.cold.4+0xa/0x1a [ 282.485370] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.490482] ? lock_downgrade+0x8e0/0x8e0 [ 282.494642] ? rcu_is_watching+0x85/0x140 [ 282.498797] ? rcu_report_qs_rnp+0x790/0x790 [ 282.503216] ? find_held_lock+0x36/0x1c0 [ 282.507327] ? check_same_owner+0x320/0x320 [ 282.511659] ? rcu_note_context_switch+0x710/0x710 [ 282.516597] ? block_ioctl+0xee/0x130 [ 282.520410] __should_failslab+0x124/0x180 [ 282.524657] should_failslab+0x9/0x14 [ 282.528460] kmem_cache_alloc+0x2af/0x760 [ 282.532615] ? ioctl_preallocate+0x2e0/0x2e0 [ 282.537036] ? fget_raw+0x20/0x20 [ 282.540499] ? putname+0xf2/0x130 [ 282.543959] ? rcu_read_lock_sched_held+0x108/0x120 [ 282.548981] getname_flags+0xd0/0x5a0 [ 282.552790] do_mkdirat+0xbd/0x2f0 [ 282.556339] ? __ia32_sys_mknod+0xb0/0xb0 [ 282.560486] ? fput+0x130/0x1a0 [ 282.563774] ? ksys_ioctl+0x81/0xd0 [ 282.567403] ? do_syscall_64+0x92/0x800 [ 282.571380] __x64_sys_mkdir+0x5c/0x80 [ 282.575276] do_syscall_64+0x1b1/0x800 [ 282.579166] ? finish_task_switch+0x1ca/0x840 [ 282.583947] ? syscall_return_slowpath+0x5c0/0x5c0 [ 282.588885] ? syscall_return_slowpath+0x30f/0x5c0 [ 282.593821] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 282.599194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.604042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.609233] RIP: 0033:0x454e37 [ 282.612414] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.631842] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 282.639557] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 282.646824] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 282.654093] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 282.661385] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 282.668654] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000016 01:13:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x17e) 01:13:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={r0, 0x7, 0x1, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x100}, 0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x3}, 0x8, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) 01:13:45 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b83060004000000000001000070020000000200000000800000"], 0x52) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1be) 01:13:45 executing program 4 (fault-call:5 fault-nth:23): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x4888]}}, 0x1c) 01:13:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) [ 282.765887] FAT-fs (loop0): bogus number of reserved sectors [ 282.771809] FAT-fs (loop0): Can't find a valid FAT filesystem 01:13:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x4788]}}, 0x1c) [ 282.942452] FAULT_INJECTION: forcing a failure. [ 282.942452] name failslab, interval 1, probability 0, space 0, times 0 [ 282.953770] CPU: 1 PID: 19261 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 282.960695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.970042] Call Trace: [ 282.972636] dump_stack+0x1b9/0x294 [ 282.976270] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.981466] ? mark_page_accessed+0x66a/0xd10 [ 282.985973] should_fail.cold.4+0xa/0x1a [ 282.990038] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.995148] ? perf_trace_lock+0xd6/0x900 [ 282.999304] ? graph_lock+0x170/0x170 [ 283.003113] ? debug_check_no_locks_freed+0x310/0x310 [ 283.008302] ? print_usage_bug+0xc0/0xc0 [ 283.012366] ? print_usage_bug+0xc0/0xc0 [ 283.016434] ? __lock_is_held+0xb5/0x140 [ 283.020501] ? print_usage_bug+0xc0/0xc0 [ 283.024570] ? check_same_owner+0x320/0x320 [ 283.028893] ? rcu_note_context_switch+0x710/0x710 [ 283.033824] ? zap_class+0x720/0x720 [ 283.037546] __should_failslab+0x124/0x180 [ 283.041787] should_failslab+0x9/0x14 [ 283.045587] kmem_cache_alloc+0x2af/0x760 [ 283.049737] ? __lock_acquire+0x7f5/0x5140 [ 283.053976] ? __lock_is_held+0xb5/0x140 [ 283.058043] ext4_alloc_inode+0xc1/0x860 [ 283.062105] ? ratelimit_state_init+0xb0/0xb0 [ 283.066595] ? find_held_lock+0x36/0x1c0 [ 283.070655] ? lock_downgrade+0x8e0/0x8e0 [ 283.074798] ? rcu_is_watching+0x85/0x140 [ 283.078935] ? rcu_report_qs_rnp+0x790/0x790 [ 283.083396] ? graph_lock+0x170/0x170 [ 283.087194] ? ratelimit_state_init+0xb0/0xb0 [ 283.091685] alloc_inode+0x63/0x190 [ 283.095317] new_inode_pseudo+0x69/0x1a0 [ 283.099368] ? prune_icache_sb+0x1a0/0x1a0 [ 283.103607] new_inode+0x1c/0x40 [ 283.106969] __ext4_new_inode+0x443/0x60c0 [ 283.111262] ? find_held_lock+0x36/0x1c0 [ 283.115339] ? ext4_free_inode+0x1870/0x1870 [ 283.119742] ? rcu_is_watching+0x85/0x140 [ 283.123879] ? rcu_report_qs_rnp+0x790/0x790 [ 283.128278] ? rcu_report_qs_rnp+0x790/0x790 [ 283.132682] ? is_bpf_text_address+0xd7/0x170 [ 283.137167] ? kernel_text_address+0x79/0xf0 [ 283.141562] ? __unwind_start+0x166/0x330 [ 283.146478] ? __kernel_text_address+0xd/0x40 [ 283.150961] ? unwind_get_return_address+0x61/0xa0 [ 283.155881] ? __save_stack_trace+0x7e/0xd0 [ 283.160221] ? save_stack+0xa9/0xd0 [ 283.163848] ? save_stack+0x43/0xd0 [ 283.167473] ? __kasan_slab_free+0x11a/0x170 [ 283.171867] ? kmem_cache_free+0x86/0x2d0 [ 283.176013] ? putname+0xf2/0x130 [ 283.179456] ? filename_create+0x2aa/0x5a0 [ 283.183687] ? do_mkdirat+0xd2/0x2f0 [ 283.187388] ? __x64_sys_mkdir+0x5c/0x80 [ 283.191440] ? do_syscall_64+0x1b1/0x800 [ 283.195501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.200856] ? kasan_check_read+0x11/0x20 [ 283.204994] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 283.209574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.215096] ? __dquot_initialize+0x615/0xdc0 [ 283.219577] ? kasan_check_write+0x14/0x20 [ 283.223800] ? graph_lock+0x170/0x170 [ 283.227595] ? dquot_get_next_dqblk+0x180/0x180 [ 283.232249] ? kasan_check_write+0x14/0x20 [ 283.236477] ? __lock_is_held+0xb5/0x140 [ 283.240529] ext4_mkdir+0x2d9/0xe50 [ 283.244156] ? ext4_init_dot_dotdot+0x510/0x510 [ 283.248814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.254339] ? security_inode_permission+0xd2/0x100 [ 283.259347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.264872] ? security_inode_mkdir+0xe8/0x120 [ 283.269440] ? getname_flags+0xd0/0x5a0 [ 283.273404] vfs_mkdir+0x42e/0x6b0 [ 283.276936] do_mkdirat+0x266/0x2f0 [ 283.280554] ? __ia32_sys_mknod+0xb0/0xb0 [ 283.284706] ? ksys_ioctl+0x81/0xd0 [ 283.288321] ? do_syscall_64+0x92/0x800 [ 283.292287] __x64_sys_mkdir+0x5c/0x80 [ 283.296163] do_syscall_64+0x1b1/0x800 [ 283.300042] ? finish_task_switch+0x1ca/0x840 [ 283.304528] ? syscall_return_slowpath+0x5c0/0x5c0 [ 283.309459] ? syscall_return_slowpath+0x30f/0x5c0 [ 283.314380] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 283.319736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.324570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.329745] RIP: 0033:0x454e37 [ 283.332917] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.352259] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 283.359956] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 283.367213] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 283.374469] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 283.381724] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 283.388993] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000017 01:13:46 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd4(r1, &(0x7f00000001c0)={0xe9e}, 0x8, 0x800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020b26bd7000fcdbdf25090000002c00020008000b000a0000000800070008000000080005000700000008000500050000000800091f010400000c0001000800090076000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r4, 0x1}, &(0x7f0000000440)=0xffffff1b) 01:13:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1de) 01:13:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0xe00000000000000]}}, 0x1c) 01:13:46 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000020000000080000004"], 0x53) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:46 executing program 4 (fault-call:5 fault-nth:24): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 283.819763] FAT-fs (loop0): bogus number of reserved sectors [ 283.825709] FAT-fs (loop0): Can't find a valid FAT filesystem [ 283.853303] FAULT_INJECTION: forcing a failure. [ 283.853303] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 283.865164] CPU: 1 PID: 19274 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 283.872100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.881460] Call Trace: [ 283.884060] dump_stack+0x1b9/0x294 [ 283.887703] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.892911] ? debug_check_no_obj_freed+0x2ff/0x584 [ 283.897950] should_fail.cold.4+0xa/0x1a [ 283.902030] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 283.906985] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.912114] ? debug_check_no_locks_freed+0x310/0x310 [ 283.917322] ? trace_hardirqs_on+0xd/0x10 [ 283.921490] ? kobject_uevent_env+0x288/0x1110 [ 283.926088] ? internal_create_group+0x347/0x970 [ 283.930872] ? perf_trace_lock+0xd6/0x900 [ 283.935028] ? perf_trace_lock_acquire+0xe3/0x980 [ 283.939889] ? zap_class+0x720/0x720 [ 283.943613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.949163] ? should_fail+0x21b/0xbcd [ 283.953066] __alloc_pages_nodemask+0x34e/0xd70 [ 283.957751] ? __alloc_pages_slowpath+0x2d50/0x2d50 [ 283.962779] ? rcu_is_watching+0x85/0x140 [ 283.966943] ? rcu_report_qs_rnp+0x790/0x790 [ 283.971371] ? find_held_lock+0x36/0x1c0 [ 283.975469] ? check_same_owner+0x320/0x320 [ 283.979807] cache_grow_begin+0x82/0x6e0 [ 283.983888] kmem_cache_alloc+0x689/0x760 [ 283.988045] ? ioctl_preallocate+0x2e0/0x2e0 [ 283.992461] ? fget_raw+0x20/0x20 [ 283.995918] ? putname+0xf2/0x130 [ 283.999559] getname_flags+0xd0/0x5a0 [ 284.003377] do_mkdirat+0xbd/0x2f0 [ 284.006930] ? __ia32_sys_mknod+0xb0/0xb0 [ 284.011084] ? fput+0x130/0x1a0 [ 284.014375] ? ksys_ioctl+0x81/0xd0 [ 284.018006] ? do_syscall_64+0x92/0x800 [ 284.021985] __x64_sys_mkdir+0x5c/0x80 [ 284.025869] do_syscall_64+0x1b1/0x800 [ 284.029743] ? finish_task_switch+0x1ca/0x840 [ 284.034233] ? syscall_return_slowpath+0x5c0/0x5c0 [ 284.039156] ? syscall_return_slowpath+0x30f/0x5c0 [ 284.044080] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 284.049437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.054273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.059450] RIP: 0033:0x454e37 [ 284.062622] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.082017] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 284.089734] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 284.097002] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 284.104274] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.111530] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 01:13:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1ee) 01:13:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1de) 01:13:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x34000]}}, 0x1c) 01:13:46 executing program 4 (fault-call:5 fault-nth:25): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 284.118786] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000018 [ 284.129882] __ntfs_error: 8 callbacks suppressed [ 284.129892] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 284.142621] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 284.151232] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) [ 284.248382] FAULT_INJECTION: forcing a failure. [ 284.248382] name failslab, interval 1, probability 0, space 0, times 0 [ 284.259736] CPU: 1 PID: 19293 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 284.266681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.276216] Call Trace: [ 284.278824] dump_stack+0x1b9/0x294 [ 284.282475] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.287685] ? __lock_is_held+0xb5/0x140 [ 284.291794] should_fail.cold.4+0xa/0x1a [ 284.295877] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.300998] ? debug_check_no_locks_freed+0x310/0x310 [ 284.306204] ? rcu_note_context_switch+0x710/0x710 [ 284.311150] ? graph_lock+0x170/0x170 [ 284.314996] ? __might_sleep+0x95/0x190 [ 284.318987] ? _cond_resched+0x14/0x30 [ 284.322884] ? __getblk_gfp+0x102/0xaf0 [ 284.326883] ? __lock_is_held+0xb5/0x140 [ 284.330974] ? check_same_owner+0x320/0x320 [ 284.335310] ? graph_lock+0x170/0x170 [ 284.339128] ? rcu_note_context_switch+0x710/0x710 [ 284.344069] ? __raw_spin_lock_init+0x1c/0x100 [ 284.348674] __should_failslab+0x124/0x180 [ 284.348844] FAT-fs (loop0): bogus number of reserved sectors [ 284.352914] should_failslab+0x9/0x14 [ 284.352982] kmem_cache_alloc+0x2af/0x760 [ 284.353013] jbd2__journal_start+0x1d3/0xa70 [ 284.353036] ? jbd2_write_access_granted.part.8+0x420/0x420 [ 284.353052] ? rcu_note_context_switch+0x710/0x710 [ 284.353072] ? __might_sleep+0x95/0x190 [ 284.358900] FAT-fs (loop0): Can't find a valid FAT filesystem [ 284.362673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.362697] __ext4_journal_start_sb+0x17a/0x5e0 [ 284.362716] ? __ext4_new_inode+0x36c0/0x60c0 [ 284.362734] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 284.412163] ? find_next_zero_bit+0x111/0x140 [ 284.416664] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 284.421673] ? find_inode_bit.isra.16+0x36f/0x510 [ 284.426517] __ext4_new_inode+0x36c0/0x60c0 [ 284.430856] ? ext4_free_inode+0x1870/0x1870 [ 284.435259] ? rcu_is_watching+0x85/0x140 [ 284.439401] ? rcu_report_qs_rnp+0x790/0x790 [ 284.443800] ? rcu_report_qs_rnp+0x790/0x790 [ 284.448218] ? is_bpf_text_address+0xd7/0x170 [ 284.452705] ? kernel_text_address+0x79/0xf0 [ 284.457104] ? __unwind_start+0x166/0x330 [ 284.461252] ? __kernel_text_address+0xd/0x40 [ 284.465739] ? unwind_get_return_address+0x61/0xa0 [ 284.470660] ? __save_stack_trace+0x7e/0xd0 [ 284.474984] ? save_stack+0xa9/0xd0 [ 284.478602] ? save_stack+0x43/0xd0 [ 284.482226] ? __kasan_slab_free+0x11a/0x170 [ 284.486623] ? kmem_cache_free+0x86/0x2d0 [ 284.490759] ? putname+0xf2/0x130 [ 284.494200] ? filename_create+0x2aa/0x5a0 [ 284.498421] ? do_mkdirat+0xd2/0x2f0 [ 284.502121] ? __x64_sys_mkdir+0x5c/0x80 [ 284.506173] ? do_syscall_64+0x1b1/0x800 [ 284.510224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.515580] ? kasan_check_read+0x11/0x20 [ 284.519731] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 284.524303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.529829] ? __dquot_initialize+0x615/0xdc0 [ 284.534310] ? kasan_check_write+0x14/0x20 [ 284.538535] ? graph_lock+0x170/0x170 [ 284.542329] ? dquot_get_next_dqblk+0x180/0x180 [ 284.546999] ? kasan_check_write+0x14/0x20 [ 284.551234] ? __lock_is_held+0xb5/0x140 [ 284.555293] ext4_mkdir+0x2d9/0xe50 [ 284.558923] ? ext4_init_dot_dotdot+0x510/0x510 [ 284.563583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.569111] ? security_inode_permission+0xd2/0x100 [ 284.574118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.579643] ? security_inode_mkdir+0xe8/0x120 [ 284.584210] ? getname_flags+0xd0/0x5a0 [ 284.588178] vfs_mkdir+0x42e/0x6b0 [ 284.591726] do_mkdirat+0x266/0x2f0 [ 284.595345] ? __ia32_sys_mknod+0xb0/0xb0 [ 284.599491] ? ksys_ioctl+0x81/0xd0 [ 284.603108] ? do_syscall_64+0x92/0x800 [ 284.607075] __x64_sys_mkdir+0x5c/0x80 [ 284.610955] do_syscall_64+0x1b1/0x800 [ 284.614842] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 284.619677] ? syscall_return_slowpath+0x5c0/0x5c0 [ 284.624598] ? syscall_return_slowpath+0x30f/0x5c0 [ 284.629520] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 284.634889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.639736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.644912] RIP: 0033:0x454e37 [ 284.648095] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.667463] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 284.675164] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 284.682421] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 284.689689] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.696945] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 284.704200] R13: 0000000000000000 R14: 00000000004d2d10 R15: 0000000000000019 [ 284.711905] EXT4-fs error (device sda1) in __ext4_new_inode:921: Out of memory 01:13:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008684cf92562864068330c381e18c9a218066764885c53109020e769bb1cd939ab859066649d95fb69e60843653a823ebd3ef77f54ccecdac5cd6e7c9c8733c5e05d30480862e283aed083579a597d6c791c365ed0889e3dbae183d9e82a9b5d24fb19a82884452f30f001ec19677956962de3f924b90e8751186743a966d0bef44856c09f49151d1423eb3ac5d479b07b32daae085b26a4383bbdd4c7416be974b7f827068136d2f46c70261c2f5c028004fa9cde4bfe4ff2d32ddfb6dc908934f0241778d82485f3d12954c374cf9bc63fe6adfb35713dcad3615cc764dd5106e2ba2b23803d86fce03cbdb4f5c55826396c4d10b724c30ccccd75913bd3d84d8e94b93871954b4c0901c325b3fa7478fea825aa368b5f14efc0d9b6ebcace310d2129a674c09aff01d6aacbf2d897050923485583587c7a0fd849e2445b1ce6ad25214b528144c6a9f592ad8c951f331279d3af95f09229fdaea2ed082b825a42f47f3efe504311a53f199f3017a0867db7ee0b66743943a9230621b4a49b1603eb9cd6b5f86521f9aac813e9c32fe2d892ae5f7362b2c11398760546c"], 0x1f6) 01:13:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1de) 01:13:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0xffffffc0]}}, 0x1c) 01:13:47 executing program 4 (fault-call:5 fault-nth:26): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8004) 01:13:47 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000020000000080000004"], 0x53) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:47 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000180)={0x6b, &(0x7f0000000100)="a96fffe1b1bace3eed61366986b28c25d839345037ee24a62bf7599a756072eb76ca132999a6ad9f2e3d77b8d2516ef92fbb138c2b6ce5bb89aa8deb280ae271974ddd9885088cb1811b93b249e40845df2369e91674f22e673891e69355d1af69351ee62977d5904c5790"}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) recvmsg$kcm(r1, &(0x7f0000000580)={&(0x7f00000002c0)=@generic, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f00000001c0)=""/1, 0x1}], 0x2, &(0x7f0000000480)=""/214, 0xd6, 0x5}, 0x2000) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=""/255, &(0x7f00000006c0)=0xff) [ 284.957913] FAT-fs (loop0): bogus number of reserved sectors [ 284.963858] FAT-fs (loop0): Can't find a valid FAT filesystem [ 284.981986] FAULT_INJECTION: forcing a failure. [ 284.981986] name failslab, interval 1, probability 0, space 0, times 0 [ 284.994405] CPU: 1 PID: 19317 Comm: syz-executor4 Not tainted 4.17.0+ #93 01:13:47 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4f, 0x480) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x101800, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000006c0)='/dev/vcs#\x00', 0x5, 0x101001) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000700)={0x4, [0x40, 0xffffffff, 0x2, 0x0]}, 0xc) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000002c0)={"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"}) readv(0xffffffffffffffff, &(0x7f0000000800), 0x2ac) r3 = signalfd4(r1, &(0x7f0000000080), 0x8, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f0000000040)=""/49, 0x31}], 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x69f642f6, 0x101, 0x0, 0x1, 0x9}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r4, 0x5}, 0x8) [ 285.001343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.010700] Call Trace: [ 285.013303] dump_stack+0x1b9/0x294 [ 285.016947] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.022155] ? __lock_acquire+0x7f5/0x5140 [ 285.026415] should_fail.cold.4+0xa/0x1a [ 285.030504] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.035623] ? debug_check_no_locks_freed+0x310/0x310 [ 285.040833] ? find_held_lock+0x36/0x1c0 [ 285.044921] ? perf_trace_lock+0xd6/0x900 [ 285.049105] ? perf_trace_lock_acquire+0xe3/0x980 01:13:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x0) [ 285.053967] ? perf_trace_lock_acquire+0xe3/0x980 [ 285.058820] ? zap_class+0x720/0x720 [ 285.062554] ? perf_trace_lock+0x900/0x900 [ 285.066886] ? graph_lock+0x170/0x170 [ 285.070698] ? is_bpf_text_address+0xd7/0x170 [ 285.075559] ? kernel_text_address+0x79/0xf0 [ 285.079983] __should_failslab+0x124/0x180 [ 285.084229] should_failslab+0x9/0x14 [ 285.088053] kmem_cache_alloc+0x47/0x760 [ 285.092122] ? find_held_lock+0x36/0x1c0 [ 285.096194] ? __es_tree_search.isra.12+0x1ba/0x220 [ 285.101228] __es_insert_extent+0x2fd/0x1130 [ 285.106516] ? ext4_es_insert_extent+0x20b/0x7c0 [ 285.111284] ? ext4_es_free_extent+0x800/0x800 [ 285.115875] ? lock_release+0xa10/0xa10 [ 285.119862] ? __lock_is_held+0xb5/0x140 [ 285.123931] ? kasan_check_write+0x14/0x20 [ 285.128171] ? do_raw_write_lock+0xbd/0x1b0 [ 285.132511] ext4_es_insert_extent+0x2d9/0x7c0 [ 285.137112] ? ext4_es_find_delayed_extent_range+0xd70/0xd70 [ 285.142925] ? __lock_is_held+0xb5/0x140 [ 285.147007] ? rcu_read_lock_sched_held+0x108/0x120 [ 285.152043] ? __kmalloc+0x5f9/0x760 [ 285.155770] ext4_ext_put_gap_in_cache+0x150/0x1d0 [ 285.160708] ? ext4_zeroout_es+0x160/0x160 [ 285.164956] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 285.170518] ext4_ext_map_blocks+0x240e/0x6270 [ 285.175112] ? perf_trace_lock+0x900/0x900 [ 285.179359] ? perf_trace_lock_acquire+0xe3/0x980 [ 285.184214] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 285.189236] ? perf_trace_lock+0x900/0x900 [ 285.193481] ? find_held_lock+0x36/0x1c0 [ 285.197547] ? graph_lock+0x170/0x170 [ 285.201353] ? graph_lock+0x170/0x170 [ 285.205163] ? lock_downgrade+0x8e0/0x8e0 [ 285.209331] ? lock_acquire+0x1dc/0x520 [ 285.213308] ? ext4_map_blocks+0x466/0x1b40 [ 285.217640] ? lock_release+0xa10/0xa10 [ 285.221619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.227160] ? ext4_es_lookup_extent+0x45d/0xdd0 [ 285.231921] ? rcu_note_context_switch+0x710/0x710 [ 285.236862] ? __might_sleep+0x95/0x190 [ 285.240853] ? down_read+0xaf/0x1b0 [ 285.244483] ? ext4_map_blocks+0x466/0x1b40 [ 285.248817] ? __down_interruptible+0x6e0/0x6e0 [ 285.253508] ? kernel_text_address+0x79/0xf0 [ 285.257918] ? __unwind_start+0x166/0x330 [ 285.262083] ext4_map_blocks+0xe17/0x1b40 [ 285.266236] ? __save_stack_trace+0x7e/0xd0 [ 285.270573] ? ext4_issue_zeroout+0x190/0x190 [ 285.275078] ? save_stack+0x43/0xd0 [ 285.278708] ? __kasan_slab_free+0x11a/0x170 [ 285.283119] ? kmem_cache_free+0x86/0x2d0 [ 285.287271] ? putname+0xf2/0x130 [ 285.290731] ext4_getblk+0x105/0x600 [ 285.294455] ? ext4_iomap_begin+0x1330/0x1330 [ 285.298954] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 285.303541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.309084] ? __dquot_initialize+0x615/0xdc0 [ 285.313581] ? kasan_check_write+0x14/0x20 [ 285.317822] ext4_bread+0x8d/0x2a0 [ 285.321367] ? ext4_getblk+0x600/0x600 [ 285.325258] ? dquot_get_next_dqblk+0x180/0x180 [ 285.329930] ? kasan_check_write+0x14/0x20 [ 285.334177] ext4_append+0x14e/0x370 [ 285.337902] ext4_mkdir+0x52a/0xe50 [ 285.341546] ? ext4_init_dot_dotdot+0x510/0x510 [ 285.346226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.351772] ? security_inode_permission+0xd2/0x100 [ 285.356882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.362423] ? security_inode_mkdir+0xe8/0x120 [ 285.367007] ? getname_flags+0xd0/0x5a0 [ 285.371000] vfs_mkdir+0x42e/0x6b0 [ 285.374554] do_mkdirat+0x266/0x2f0 [ 285.378193] ? __ia32_sys_mknod+0xb0/0xb0 [ 285.382346] ? ksys_ioctl+0x81/0xd0 [ 285.385976] ? do_syscall_64+0x92/0x800 [ 285.389955] __x64_sys_mkdir+0x5c/0x80 [ 285.393854] do_syscall_64+0x1b1/0x800 [ 285.397743] ? finish_task_switch+0x1ca/0x840 [ 285.402247] ? syscall_return_slowpath+0x5c0/0x5c0 [ 285.407186] ? syscall_return_slowpath+0x30f/0x5c0 [ 285.412127] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 285.417501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.422354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.427542] RIP: 0033:0x454e37 [ 285.430724] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.450197] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 285.457916] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 285.465190] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 285.472460] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 285.479729] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 285.486999] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000001a [ 285.497574] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. 01:13:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x400000000000000]}}, 0x1c) 01:13:48 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000100)="2a2625262d73656c661100", 0xb, 0x2) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 285.505500] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 285.514457] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:48 executing program 4 (fault-call:5 fault-nth:27): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fa) [ 285.689053] FAT-fs (loop0): bogus number of reserved sectors [ 285.694963] FAT-fs (loop0): Can't find a valid FAT filesystem [ 285.701573] FAULT_INJECTION: forcing a failure. [ 285.701573] name failslab, interval 1, probability 0, space 0, times 0 [ 285.713229] CPU: 1 PID: 19346 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 285.720164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.729611] Call Trace: [ 285.732214] dump_stack+0x1b9/0x294 [ 285.735848] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.741044] ? graph_lock+0x170/0x170 [ 285.744847] ? graph_lock+0x170/0x170 [ 285.748656] should_fail.cold.4+0xa/0x1a [ 285.752727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.757838] ? __lock_is_held+0xb5/0x140 [ 285.761901] ? find_held_lock+0x36/0x1c0 [ 285.765968] ? graph_lock+0x170/0x170 [ 285.769776] ? check_same_owner+0x320/0x320 [ 285.774103] ? rcu_note_context_switch+0x710/0x710 [ 285.779051] ? __lock_is_held+0xb5/0x140 [ 285.783129] ? check_same_owner+0x320/0x320 [ 285.787453] ? rcu_note_context_switch+0x710/0x710 [ 285.792392] __should_failslab+0x124/0x180 [ 285.796630] should_failslab+0x9/0x14 [ 285.800429] __kmalloc+0x2c8/0x760 [ 285.803973] ? ext4_find_extent+0x6f3/0x960 [ 285.808306] ext4_find_extent+0x6f3/0x960 [ 285.812464] ext4_ext_map_blocks+0x28a/0x6270 [ 285.816959] ? perf_trace_lock+0x900/0x900 [ 285.821204] ? perf_trace_lock_acquire+0xe3/0x980 [ 285.826046] ? ext4_ext_tree_init+0x105/0x140 [ 285.830545] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 285.835564] ? perf_trace_lock+0x900/0x900 [ 285.839806] ? find_held_lock+0x36/0x1c0 [ 285.843873] ? graph_lock+0x170/0x170 [ 285.847674] ? graph_lock+0x170/0x170 [ 285.851481] ? lock_downgrade+0x8e0/0x8e0 [ 285.855642] ? lock_acquire+0x1dc/0x520 [ 285.859617] ? ext4_map_blocks+0x466/0x1b40 [ 285.863944] ? lock_release+0xa10/0xa10 [ 285.867927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.873469] ? ext4_es_lookup_extent+0x45d/0xdd0 [ 285.878228] ? rcu_note_context_switch+0x710/0x710 [ 285.883168] ? __might_sleep+0x95/0x190 [ 285.887150] ? down_read+0xaf/0x1b0 [ 285.890775] ? ext4_map_blocks+0x466/0x1b40 [ 285.895105] ? __down_interruptible+0x6e0/0x6e0 [ 285.900046] ? kernel_text_address+0x79/0xf0 [ 285.904462] ? __unwind_start+0x166/0x330 [ 285.908614] ext4_map_blocks+0xe17/0x1b40 [ 285.912762] ? __save_stack_trace+0x7e/0xd0 [ 285.917092] ? ext4_issue_zeroout+0x190/0x190 [ 285.921593] ? save_stack+0x43/0xd0 [ 285.925246] ? __kasan_slab_free+0x11a/0x170 [ 285.929652] ? kmem_cache_free+0x86/0x2d0 [ 285.933797] ? putname+0xf2/0x130 [ 285.937253] ext4_getblk+0x105/0x600 [ 285.940978] ? ext4_iomap_begin+0x1330/0x1330 [ 285.945472] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 285.950056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.955594] ? __dquot_initialize+0x615/0xdc0 [ 285.960091] ? kasan_check_write+0x14/0x20 [ 285.964328] ext4_bread+0x8d/0x2a0 [ 285.967873] ? ext4_getblk+0x600/0x600 [ 285.971758] ? dquot_get_next_dqblk+0x180/0x180 [ 285.976427] ? kasan_check_write+0x14/0x20 [ 285.980667] ext4_append+0x14e/0x370 [ 285.984396] ext4_mkdir+0x52a/0xe50 [ 285.988031] ? ext4_init_dot_dotdot+0x510/0x510 [ 285.992704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.998243] ? security_inode_permission+0xd2/0x100 [ 286.003267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.008802] ? security_inode_mkdir+0xe8/0x120 [ 286.013383] ? getname_flags+0xd0/0x5a0 [ 286.017361] vfs_mkdir+0x42e/0x6b0 [ 286.020906] do_mkdirat+0x266/0x2f0 [ 286.024538] ? __ia32_sys_mknod+0xb0/0xb0 [ 286.028691] ? ksys_ioctl+0x81/0xd0 [ 286.032322] ? do_syscall_64+0x92/0x800 [ 286.036297] __x64_sys_mkdir+0x5c/0x80 [ 286.040186] do_syscall_64+0x1b1/0x800 [ 286.044071] ? finish_task_switch+0x1ca/0x840 [ 286.048569] ? syscall_return_slowpath+0x5c0/0x5c0 [ 286.053500] ? syscall_return_slowpath+0x30f/0x5c0 [ 286.058433] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 286.063801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.068650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.073833] RIP: 0033:0x454e37 [ 286.077016] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.096378] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 286.104089] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 286.111356] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 286.118623] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 286.125890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 286.133159] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000001b [ 286.141687] ntfs: (device loop4): parse_options(): Unrecognized mount option #prors. [ 286.149624] ntfs: (device loop4): parse_options(): Unrecognized mount option sá šssGfiles. [ 286.158226] ntfs: (device loop4): parse_options(): Unrecognized mount option . 01:13:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0xe000000]}}, 0x1c) 01:13:48 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcb, &(0x7f0000000000)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x1) r1 = gettid() r2 = getpgrp(r1) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101400, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) bind$packet(r3, &(0x7f00000001c0)={0x11, 0xf8, r4, 0x1, 0x3, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x5b, 0x20400) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) r6 = signalfd4(r5, &(0x7f0000000080), 0x8, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r6, &(0x7f00000002c0)={r3, r0, 0x7fffffff}) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8201, 0x200000) 01:13:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fc) 01:13:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1de) 01:13:48 executing program 7: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000140)={"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"}) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/33, 0x21) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000776fbf4d0bec0c08690c100200002008b8306000400000000000100007002000000020000000080000004"], 0x53) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) 01:13:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:48 executing program 4 (fault-call:5 fault-nth:28): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) [ 286.277617] FAULT_INJECTION: forcing a failure. [ 286.277617] name failslab, interval 1, probability 0, space 0, times 0 [ 286.288989] CPU: 1 PID: 19357 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 286.295926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.305301] Call Trace: [ 286.307893] dump_stack+0x1b9/0x294 [ 286.311520] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.316702] ? rcu_report_qs_rnp+0x790/0x790 [ 286.321109] should_fail.cold.4+0xa/0x1a [ 286.325165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.330259] ? __kernel_text_address+0xd/0x40 [ 286.334745] ? unwind_get_return_address+0x61/0xa0 [ 286.339665] ? __save_stack_trace+0x7e/0xd0 [ 286.343979] ? graph_lock+0x170/0x170 [ 286.347778] ? save_stack+0xa9/0xd0 [ 286.351402] ? __lock_is_held+0xb5/0x140 [ 286.355450] ? ext4_bread+0x8d/0x2a0 [ 286.359207] ? check_same_owner+0x320/0x320 [ 286.363519] ? kasan_check_write+0x14/0x20 [ 286.367745] ? rcu_note_context_switch+0x710/0x710 [ 286.372689] __should_failslab+0x124/0x180 [ 286.376923] should_failslab+0x9/0x14 [ 286.380730] __kmalloc+0x2c8/0x760 [ 286.384269] ? ext4_find_extent+0x6f3/0x960 [ 286.388588] ext4_find_extent+0x6f3/0x960 [ 286.392737] ext4_ext_map_blocks+0x28a/0x6270 [ 286.397226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.402763] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 286.407774] ? graph_lock+0x170/0x170 [ 286.411582] ? perf_trace_lock+0xd6/0x900 [ 286.415720] ? find_held_lock+0x36/0x1c0 [ 286.419773] ? zap_class+0x720/0x720 [ 286.423478] ? graph_lock+0x170/0x170 [ 286.427267] ? lock_downgrade+0x8e0/0x8e0 [ 286.431409] ? graph_lock+0x170/0x170 [ 286.435216] ? lock_acquire+0x1dc/0x520 [ 286.439177] ? ext4_map_blocks+0x871/0x1b40 [ 286.443493] ? lock_release+0xa10/0xa10 [ 286.447456] ? check_same_owner+0x320/0x320 [ 286.451768] ? rcu_note_context_switch+0x710/0x710 [ 286.456690] ? __might_sleep+0x95/0x190 [ 286.460658] ? down_write+0x87/0x120 [ 286.464362] ? ext4_map_blocks+0x871/0x1b40 [ 286.468672] ? down_read+0x1b0/0x1b0 [ 286.472386] ext4_map_blocks+0x8d9/0x1b40 [ 286.476536] ? __save_stack_trace+0x7e/0xd0 [ 286.480855] ? ext4_issue_zeroout+0x190/0x190 [ 286.485344] ? save_stack+0x43/0xd0 [ 286.488958] ? __kasan_slab_free+0x11a/0x170 [ 286.493355] ? kmem_cache_free+0x86/0x2d0 [ 286.497492] ? putname+0xf2/0x130 [ 286.500940] ext4_getblk+0x105/0x600 [ 286.504645] ? ext4_iomap_begin+0x1330/0x1330 [ 286.509145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.514676] ? __dquot_initialize+0x615/0xdc0 [ 286.519160] ? kasan_check_write+0x14/0x20 [ 286.523386] ext4_bread+0x8d/0x2a0 [ 286.526919] ? ext4_getblk+0x600/0x600 [ 286.530793] ? dquot_get_next_dqblk+0x180/0x180 [ 286.535458] ? kasan_check_write+0x14/0x20 [ 286.539692] ext4_append+0x14e/0x370 [ 286.543402] ext4_mkdir+0x52a/0xe50 [ 286.547039] ? ext4_init_dot_dotdot+0x510/0x510 [ 286.551715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.557242] ? security_inode_permission+0xd2/0x100 [ 286.562261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.567784] ? security_inode_mkdir+0xe8/0x120 [ 286.572355] ? getname_flags+0xd0/0x5a0 [ 286.576320] vfs_mkdir+0x42e/0x6b0 [ 286.579854] do_mkdirat+0x266/0x2f0 [ 286.583475] ? __ia32_sys_mknod+0xb0/0xb0 [ 286.587616] ? ksys_ioctl+0x81/0xd0 [ 286.591234] ? do_syscall_64+0x92/0x800 [ 286.595201] __x64_sys_mkdir+0x5c/0x80 [ 286.599076] do_syscall_64+0x1b1/0x800 [ 286.602954] ? finish_task_switch+0x1ca/0x840 [ 286.607440] ? syscall_return_slowpath+0x5c0/0x5c0 [ 286.612361] ? syscall_return_slowpath+0x30f/0x5c0 [ 286.617283] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 286.622662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.627501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.632680] RIP: 0033:0x454e37 [ 286.635856] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.655240] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 286.662938] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 286.670196] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 01:13:49 executing program 5: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@can, &(0x7f0000000180)=0x80, 0x800) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000480)=0x101, 0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1000000000000179) syncfs(r1) r2 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x80800) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0xfffffffffffff358}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xbb}}, [0x1f, 0x80000000, 0x1, 0x6, 0x8, 0x2, 0xffff, 0x3f, 0x100000000, 0xffffffffffffff00, 0xcf53aae, 0x5, 0x80000000, 0x81, 0x401]}, &(0x7f00000001c0)=0x100) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0xb86) signalfd4(r1, &(0x7f0000000080), 0x8, 0x0) [ 286.677453] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 286.684970] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 286.692231] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000001c 01:13:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x8035]}}, 0x1c) [ 286.734670] FAT-fs (loop0): bogus number of reserved sectors [ 286.740643] FAT-fs (loop0): Can't find a valid FAT filesystem 01:13:49 executing program 1 (fault-call:3 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) 01:13:49 executing program 6 (fault-call:4 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1fd) 01:13:49 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) 01:13:49 executing program 4 (fault-call:5 fault-nth:29): ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) io_destroy(0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2370726f72733d7265634f7465722c7315e10d9a7307734766696c65733d9a91af47eb6e5c203f2c00"]) 01:13:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x5aa, 0x0, &(0x7f0000000580)={0xa, 0x8100, 0x5, @empty={[0x0, 0x0, 0x200000000000000]}}, 0x1c) [ 286.911501] FAULT_INJECTION: forcing a failure. [ 286.911501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.916509] FAULT_INJECTION: forcing a failure. [ 286.916509] name failslab, interval 1, probability 0, space 0, times 0 [ 286.923844] CPU: 1 PID: 19381 Comm: syz-executor1 Not tainted 4.17.0+ #93 [ 286.941907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.951259] Call Trace: [ 286.953851] dump_stack+0x1b9/0x294 [ 286.957482] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.962684] should_fail.cold.4+0xa/0x1a [ 286.966746] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.971850] ? graph_lock+0x170/0x170 [ 286.975656] ? graph_lock+0x170/0x170 [ 286.979469] ? find_held_lock+0x36/0x1c0 [ 286.983530] ? __lock_is_held+0xb5/0x140 [ 286.987600] ? check_same_owner+0x320/0x320 [ 286.991921] ? rcu_is_watching+0x85/0x140 [ 286.996677] ? rcu_note_context_switch+0x710/0x710 [ 287.001610] ? __might_sleep+0x95/0x190 [ 287.005600] __alloc_pages_nodemask+0x34e/0xd70 [ 287.010273] ? __alloc_pages_slowpath+0x2d50/0x2d50 [ 287.015286] ? filemap_map_pages+0x1870/0x1870 [ 287.019862] ? print_usage_bug+0xc0/0xc0 [ 287.023926] ? print_usage_bug+0xc0/0xc0 [ 287.027981] ? __wake_up_common_lock+0x1c2/0x300 [ 287.032749] ? print_usage_bug+0xc0/0xc0 [ 287.036809] ? __lock_acquire+0x7f5/0x5140 [ 287.041054] ? print_usage_bug+0xc0/0xc0 [ 287.045132] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 287.050765] alloc_pages_current+0x10c/0x210 [ 287.055171] __page_cache_alloc+0x386/0x5d0 [ 287.059488] ? debug_check_no_locks_freed+0x310/0x310 [ 287.064680] ? debug_check_no_locks_freed+0x310/0x310 [ 287.069871] ? print_usage_bug+0xc0/0xc0 [ 287.073928] ? __filemap_set_wb_err+0x3a0/0x3a0 [ 287.078596] ? print_usage_bug+0xc0/0xc0 [ 287.082656] pagecache_get_page+0x386/0xe20 [ 287.086972] ? check_noncircular+0x20/0x20 [ 287.091205] ? find_get_pages_contig+0x1560/0x1560 [ 287.096131] ? debug_check_no_locks_freed+0x310/0x310 [ 287.101318] ? __lock_acquire+0x7f5/0x5140 [ 287.105552] ? print_usage_bug+0xc0/0xc0 [ 287.109620] ? print_usage_bug+0xc0/0xc0 [ 287.113681] ? debug_check_no_locks_freed+0x310/0x310 [ 287.118878] ? __lock_acquire+0x7f5/0x5140 [ 287.123110] ? perf_trace_lock+0x900/0x900 [ 287.127349] ? __lock_acquire+0x7f5/0x5140 [ 287.131585] ? debug_check_no_locks_freed+0x310/0x310 [ 287.136771] ? perf_trace_lock_acquire+0xe3/0x980 [ 287.141611] ? print_usage_bug+0xc0/0xc0 [ 287.145673] grab_cache_page_write_begin+0x75/0xa0 [ 287.150603] block_write_begin+0xa6/0x350 [ 287.154749] ? fat_add_cluster+0x140/0x140 [ 287.158981] ? __block_write_begin+0x40/0x40 [ 287.163383] ? graph_lock+0x170/0x170 [ 287.167181] ? lock_acquire+0x1dc/0x520 [ 287.171154] ? __fdget_pos+0x1a9/0x1e0 [ 287.175043] ? __lock_acquire+0x7f5/0x5140 [ 287.179280] cont_write_begin+0x531/0x820 [ 287.183423] ? find_held_lock+0x36/0x1c0 [ 287.187489] ? block_write_begin+0x350/0x350 [ 287.191897] ? _parse_integer+0x190/0x190 [ 287.196057] fat_write_begin+0x8d/0x120 [ 287.200032] ? fat_add_cluster+0x140/0x140 [ 287.204267] pagecache_write_begin+0x88/0xc0 [ 287.208689] cont_write_begin+0x206/0x820 [ 287.212843] ? block_write_begin+0x350/0x350 [ 287.217263] fat_write_begin+0x8d/0x120 [ 287.221231] ? fat_add_cluster+0x140/0x140 [ 287.225467] pagecache_write_begin+0x88/0xc0 [ 287.229880] generic_cont_expand_simple+0x120/0x1d0 [ 287.234896] ? buffer_exit_cpu_dead+0x1e0/0x1e0 [ 287.239563] ? __might_sleep+0x95/0x190 [ 287.243540] ? down_write+0x87/0x120 [ 287.247250] ? fat_fallocate+0x12d/0x320 [ 287.251370] ? down_read+0x1b0/0x1b0 [ 287.255085] fat_cont_expand+0x71/0x2b0 [ 287.259072] fat_fallocate+0x18c/0x320 [ 287.262959] ? fat_cont_expand+0x2b0/0x2b0 [ 287.267191] vfs_fallocate+0x4b4/0x8d0 [ 287.271092] ksys_fallocate+0x56/0x90 [ 287.274891] __x64_sys_fallocate+0x97/0xf0 [ 287.279123] do_syscall_64+0x1b1/0x800 [ 287.283006] ? finish_task_switch+0x1ca/0x840 [ 287.287503] ? syscall_return_slowpath+0x5c0/0x5c0 [ 287.292445] ? syscall_return_slowpath+0x30f/0x5c0 [ 287.297374] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 287.302739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.307581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.312761] RIP: 0033:0x4559f9 [ 287.315938] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.335320] RSP: 002b:00007f0717f38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 287.343030] RAX: ffffffffffffffda RBX: 00007f0717f396d4 RCX: 00000000004559f9 [ 287.350291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000014 [ 287.357555] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 287.364817] R10: 0000000000008004 R11: 0000000000000246 R12: 0000000000000015 [ 287.372101] R13: 00000000004bb985 R14: 00000000004c8528 R15: 0000000000000000 [ 287.379385] CPU: 0 PID: 19384 Comm: syz-executor6 Not tainted 4.17.0+ #93 [ 287.386332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.395702] Call Trace: [ 287.398296] dump_stack+0x1b9/0x294 [ 287.401946] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.407159] should_fail.cold.4+0xa/0x1a [ 287.411227] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.416347] ? memset+0x31/0x40 [ 287.419634] ? perf_trace_lock_acquire+0x4f1/0x980 [ 287.424564] ? graph_lock+0x170/0x170 [ 287.428387] ? __lock_is_held+0xb5/0x140 [ 287.432459] __should_failslab+0x124/0x180 [ 287.436693] should_failslab+0x9/0x14 [ 287.440487] kmem_cache_alloc+0x47/0x760 [ 287.444543] ? rcu_note_context_switch+0x710/0x710 [ 287.449477] ? mempool_free+0x370/0x370 [ 287.453447] mempool_alloc_slab+0x44/0x60 [ 287.457592] mempool_alloc+0x18b/0x490 [ 287.461484] ? mempool_destroy+0x30/0x30 [ 287.465540] ? perf_trace_lock+0x900/0x900 [ 287.469779] ? graph_lock+0x170/0x170 [ 287.473578] ? find_get_pages_range_tag+0x93f/0x1250 [ 287.478690] bio_alloc_bioset+0x384/0x6d0 [ 287.482840] ? bvec_alloc+0x2d0/0x2d0 [ 287.486656] mpage_alloc.isra.8+0x3d/0x270 [ 287.490894] __mpage_writepage+0x154d/0x1a60 [ 287.495309] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 287.500327] ? percpu_counter_add_batch+0xf2/0x150 [ 287.505268] ? clean_buffers+0x2f0/0x2f0 [ 287.509338] ? balance_dirty_pages_ratelimited+0x1f50/0x1f50 [ 287.515135] ? graph_lock+0x170/0x170 [ 287.518928] ? __lock_is_held+0xb5/0x140 [ 287.523012] ? __lock_is_held+0xb5/0x140 [ 287.527094] write_cache_pages+0x920/0x1690 [ 287.531433] ? clean_buffers+0x2f0/0x2f0 [ 287.535505] ? clear_page_dirty_for_io+0x1200/0x1200 [ 287.540610] ? debug_check_no_locks_freed+0x310/0x310 [ 287.545801] ? perf_tp_event+0xc30/0xc30 [ 287.549859] ? perf_trace_lock_acquire+0x4f1/0x980 [ 287.554795] ? memset+0x31/0x40 [ 287.558090] ? perf_trace_lock_acquire+0x4f1/0x980 [ 287.563018] ? graph_lock+0x170/0x170 [ 287.566831] ? perf_trace_lock+0x900/0x900 [ 287.571061] ? blk_start_plug+0xc4/0x360 [ 287.575119] ? blk_lld_busy+0x70/0x70 [ 287.578917] ? find_held_lock+0x36/0x1c0 [ 287.582992] ? lock_downgrade+0x8e0/0x8e0 [ 287.587138] ? perf_trace_lock_acquire+0x4f1/0x980 [ 287.592067] ? fat_add_cluster+0x140/0x140 [ 287.596300] mpage_writepages+0x140/0x300 [ 287.600453] ? mpage_end_io+0x1c0/0x1c0 [ 287.604423] ? fat_add_cluster+0x140/0x140 [ 287.608654] ? __filemap_fdatawrite_range+0x2ec/0x470 [ 287.613843] ? ktime_get_coarse_real_ts64+0x273/0x390 [ 287.619041] ? _raw_spin_unlock+0x22/0x30 [ 287.623183] ? wbc_attach_and_unlock_inode+0x643/0x9e0 [ 287.628470] fat_writepages+0x24/0x30 [ 287.632264] ? fat_readpages+0x40/0x40 [ 287.636146] do_writepages+0x9a/0x1a0 [ 287.639952] __filemap_fdatawrite_range+0x333/0x470 [ 287.644964] ? delete_from_page_cache_batch+0xf70/0xf70 [ 287.650342] ? file_update_time+0xdc/0x640 [ 287.654582] filemap_write_and_wait_range+0x48/0xd0 [ 287.659612] generic_file_direct_write+0x201/0x4b0 [ 287.664551] __generic_file_write_iter+0x2ff/0x630 [ 287.669484] generic_file_write_iter+0x430/0x850 [ 287.674243] ? __generic_file_write_iter+0x630/0x630 [ 287.679371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.684908] ? iov_iter_init+0xc9/0x1f0 [ 287.688884] __vfs_write+0x6ae/0x9d0 [ 287.692601] ? kernel_read+0x120/0x120 [ 287.696493] ? __lock_is_held+0xb5/0x140 [ 287.700573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.706113] ? __sb_start_write+0x17f/0x300 [ 287.710439] vfs_write+0x1f8/0x560 [ 287.713995] ksys_write+0xf9/0x250 [ 287.717541] ? __ia32_sys_read+0xb0/0xb0 [ 287.721601] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 287.726439] ? ksys_fallocate+0x6b/0x90 [ 287.730418] __x64_sys_write+0x73/0xb0 [ 287.734303] do_syscall_64+0x1b1/0x800 [ 287.738189] ? finish_task_switch+0x1ca/0x840 [ 287.742682] ? syscall_return_slowpath+0x5c0/0x5c0 [ 287.747621] ? syscall_return_slowpath+0x30f/0x5c0 [ 287.752554] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 287.757923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.762774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.767957] RIP: 0033:0x4559f9 [ 287.771135] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.790711] RSP: 002b:00007f23f5a5bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 287.798430] RAX: ffffffffffffffda RBX: 00007f23f5a5c6d4 RCX: 00000000004559f9 [ 287.805705] RDX: 00000000000001fd RSI: 0000000020000b80 RDI: 0000000000000014 [ 287.812967] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 287.820228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 287.827500] R13: 00000000004c2385 R14: 00000000004d3448 R15: 0000000000000000 [ 287.889463] FAULT_INJECTION: forcing a failure. [ 287.889463] name failslab, interval 1, probability 0, space 0, times 0 [ 287.901127] CPU: 0 PID: 19390 Comm: syz-executor3 Not tainted 4.17.0+ #93 [ 287.908063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.917428] Call Trace: [ 287.920026] dump_stack+0x1b9/0x294 [ 287.923662] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.928855] ? perf_trace_lock_acquire+0xe3/0x980 [ 287.933715] should_fail.cold.4+0xa/0x1a [ 287.937786] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.943450] ? rcu_note_context_switch+0x710/0x710 [ 287.948390] ? graph_lock+0x170/0x170 [ 287.952199] ? __might_sleep+0x95/0x190 [ 287.956183] ? find_held_lock+0x36/0x1c0 [ 287.960253] ? __lock_is_held+0xb5/0x140 [ 287.964334] ? check_same_owner+0x320/0x320 [ 287.968658] ? perf_trace_lock+0xd6/0x900 [ 287.972808] ? rcu_note_context_switch+0x710/0x710 [ 287.977748] __should_failslab+0x124/0x180 [ 287.981991] should_failslab+0x9/0x14 [ 287.985796] kmem_cache_alloc_node_trace+0x26f/0x770 [ 287.990903] ? graph_lock+0x170/0x170 [ 287.994727] __get_vm_area_node+0x12d/0x390 [ 287.999069] __vmalloc_node_range+0xc4/0x760 [ 288.003478] ? ion_heap_map_kernel+0x86/0x490 [ 288.007982] ? ion_heap_map_kernel+0x86/0x490 [ 288.012478] vmalloc+0x6f/0x80 [ 288.015674] ? ion_heap_map_kernel+0x86/0x490 [ 288.020170] ion_heap_map_kernel+0x86/0x490 [ 288.024499] ? rcu_report_qs_rnp+0x790/0x790 [ 288.028923] ion_dma_buf_begin_cpu_access+0x188/0x5a0 [ 288.034122] ? ion_dma_buf_end_cpu_access+0x4a0/0x4a0 [ 288.039320] dma_buf_begin_cpu_access+0x7f/0x160 [ 288.044090] dma_buf_ioctl+0x1aa/0x240 [ 288.047984] ? dma_buf_begin_cpu_access+0x160/0x160 [ 288.053094] ? wait_for_completion+0x870/0x870 [ 288.057681] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 288.062881] ? dma_buf_begin_cpu_access+0x160/0x160 [ 288.067902] do_vfs_ioctl+0x1cf/0x16f0 [ 288.071801] ? ioctl_preallocate+0x2e0/0x2e0 [ 288.076215] ? fget_raw+0x20/0x20 [ 288.079675] ? __sb_end_write+0xac/0xe0 [ 288.083657] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.089196] ? fput+0x130/0x1a0 [ 288.092485] ? ksys_write+0x1a6/0x250 [ 288.096298] ? security_file_ioctl+0x94/0xc0 [ 288.100712] ksys_ioctl+0xa9/0xd0 [ 288.104172] __x64_sys_ioctl+0x73/0xb0 [ 288.108064] do_syscall_64+0x1b1/0x800 [ 288.111953] ? finish_task_switch+0x1ca/0x840 [ 288.116451] ? syscall_return_slowpath+0x5c0/0x5c0 [ 288.121382] ? syscall_return_slowpath+0x30f/0x5c0 [ 288.126319] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 288.131691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.136543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.141733] RIP: 0033:0x4559f9 [ 288.144917] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.164391] RSP: 002b:00007ffa9befbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.172103] RAX: ffffffffffffffda RBX: 00007ffa9befc6d4 RCX: 00000000004559f9 [ 288.179373] RDX: 0000000020000080 RSI: 0000000040086200 RDI: 0000000000000015 [ 288.186642] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 288.193907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 288.201174] R13: 00000000004bca98 R14: 00000000004ca6d0 R15: 0000000000000000 [ 288.208870] syz-executor3: vmalloc: allocation failure: 128 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 288.219149] syz-executor3 cpuset=syz3 mems_allowed=0 [ 288.224685] CPU: 0 PID: 19390 Comm: syz-executor3 Not tainted 4.17.0+ #93 [ 288.231615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.240966] Call Trace: [ 288.243561] dump_stack+0x1b9/0x294 [ 288.247195] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.252398] warn_alloc.cold.117+0xb2/0x1b8 [ 288.256727] ? zone_watermark_ok_safe+0x3b0/0x3b0 [ 288.261569] ? __get_vm_area_node+0x12d/0x390 [ 288.266067] ? __get_vm_area_node+0x12d/0x390 [ 288.270569] ? rcu_read_lock_sched_held+0x108/0x120 [ 288.275589] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 288.280870] ? graph_lock+0x170/0x170 [ 288.284683] ? __get_vm_area_node+0x2da/0x390 [ 288.289189] __vmalloc_node_range+0x472/0x760 [ 288.293694] ? ion_heap_map_kernel+0x86/0x490 [ 288.298193] vmalloc+0x6f/0x80 [ 288.301387] ? ion_heap_map_kernel+0x86/0x490 [ 288.305882] ion_heap_map_kernel+0x86/0x490 [ 288.310209] ? rcu_report_qs_rnp+0x790/0x790 [ 288.314655] ion_dma_buf_begin_cpu_access+0x188/0x5a0 [ 288.319856] ? ion_dma_buf_end_cpu_access+0x4a0/0x4a0 [ 288.325052] dma_buf_begin_cpu_access+0x7f/0x160 [ 288.329817] dma_buf_ioctl+0x1aa/0x240 [ 288.333711] ? dma_buf_begin_cpu_access+0x160/0x160 [ 288.338733] ? wait_for_completion+0x870/0x870 [ 288.343317] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 288.348510] ? dma_buf_begin_cpu_access+0x160/0x160 [ 288.353528] do_vfs_ioctl+0x1cf/0x16f0 [ 288.357422] ? ioctl_preallocate+0x2e0/0x2e0 [ 288.361832] ? fget_raw+0x20/0x20 [ 288.365292] ? __sb_end_write+0xac/0xe0 [ 288.369278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.374818] ? fput+0x130/0x1a0 [ 288.378100] ? ksys_write+0x1a6/0x250 [ 288.381910] ? security_file_ioctl+0x94/0xc0 [ 288.386329] ksys_ioctl+0xa9/0xd0 [ 288.389793] __x64_sys_ioctl+0x73/0xb0 [ 288.393686] do_syscall_64+0x1b1/0x800 [ 288.397581] ? finish_task_switch+0x1ca/0x840 [ 288.402087] ? syscall_return_slowpath+0x5c0/0x5c0 [ 288.407026] ? syscall_return_slowpath+0x30f/0x5c0 [ 288.411968] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 288.417341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.422194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.427382] RIP: 0033:0x4559f9 [ 288.430567] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.450039] RSP: 002b:00007ffa9befbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.457751] RAX: ffffffffffffffda RBX: 00007ffa9befc6d4 RCX: 00000000004559f9 [ 288.465041] RDX: 0000000020000080 RSI: 0000000040086200 RDI: 0000000000000015 [ 288.472314] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 288.479584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 288.486853] R13: 00000000004bca98 R14: 00000000004ca6d0 R15: 0000000000000000 [ 288.494467] Mem-Info: [ 288.496959] active_anon:96193 inactive_anon:346 isolated_anon:0 [ 288.496959] active_file:8834 inactive_file:12825 isolated_file:0 [ 288.496959] unevictable:0 dirty:177 writeback:0 unstable:0 [ 288.496959] slab_reclaimable:11671 slab_unreclaimable:104091 [ 288.496959] mapped:74868 shmem:356 pagetables:1146 bounce:0 [ 288.496959] free:1296907 free_pcp:550 free_cma:0 [ 288.530856] Node 0 active_anon:384772kB inactive_anon:1384kB active_file:35336kB inactive_file:51300kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:299472kB dirty:708kB writeback:0kB shmem:1424kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 45056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 288.559194] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 288.562975] FAULT_INJECTION: forcing a failure. [ 288.562975] name failslab, interval 1, probability 0, space 0, times 0 [ 288.585412] lowmem_reserve[]: 0 2827 6332 6332 [ 288.596668] CPU: 1 PID: 19393 Comm: syz-executor4 Not tainted 4.17.0+ #93 [ 288.596680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.601276] Node 0 [ 288.608138] Call Trace: [ 288.608162] dump_stack+0x1b9/0x294 [ 288.608182] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.617570] DMA32 free:2898032kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898948kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:916kB local_pcp:192kB free_cma:0kB [ 288.619755] ? lock_downgrade+0x8e0/0x8e0 [ 288.619770] ? inode_io_list_del_locked+0x3b0/0x3b0 [ 288.619793] should_fail.cold.4+0xa/0x1a [ 288.622363] lowmem_reserve[]: [ 288.625973] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.625997] ? graph_lock+0x170/0x170 [ 288.631179] 0 [ 288.658208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.658223] ? __mark_inode_dirty+0x499/0x1530 [ 288.658242] ? __inode_attach_wb+0x1310/0x1310 [ 288.662384] 0 [ 288.667369] ? kasan_check_read+0x11/0x20 [ 288.667395] ? __lock_is_held+0xb5/0x140 [ 288.671445] 3504 [ 288.674516] ? balance_leaf+0x6888/0xf070 [ 288.674547] ? check_same_owner+0x320/0x320 [ 288.679639] 3504 [ 288.683404] ? __dquot_alloc_space+0x4fc/0x8a0 [ 288.683419] ? rcu_note_context_switch+0x710/0x710 [ 288.683436] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 288.690740] __should_failslab+0x124/0x180 [ 288.690761] should_failslab+0x9/0x14 [ 288.695333] Node 0 [ 288.699877] kmem_cache_alloc+0x2af/0x760 [ 288.699892] ? percpu_counter_add_batch+0xf2/0x150 [ 288.699919] ext4_mb_new_blocks+0x773/0x4730 [ 288.701732] Normal free:2273688kB min:37316kB low:46644kB high:55972kB active_anon:384772kB inactive_anon:1384kB active_file:35336kB inactive_file:51300kB unevictable:0kB writepending:708kB present:4718592kB managed:3589016kB mlocked:0kB kernel_stack:5472kB pagetables:4584kB bounce:0kB free_pcp:1280kB local_pcp:576kB free_cma:0kB [ 288.705827] ? find_held_lock+0x36/0x1c0 [ 288.705857] ? ext4_discard_preallocations+0x13b0/0x13b0 [ 288.709915] lowmem_reserve[]: [ 288.711955] ? rcu_is_watching+0x85/0x140 [ 288.711976] ? rcu_report_qs_rnp+0x790/0x790 [ 288.716113] 0 [ 288.720402] ? rcu_report_qs_rnp+0x790/0x790 [ 288.720431] ? is_bpf_text_address+0xd7/0x170 [ 288.722484] 0 [ 288.727035] ? kernel_text_address+0x79/0xf0 [ 288.727048] ? __unwind_start+0x166/0x330 [ 288.727066] ? __kernel_text_address+0xd/0x40 [ 288.731984] 0 [ 288.736968] ? unwind_get_return_address+0x61/0xa0 [ 288.736985] ? __save_stack_trace+0x7e/0xd0 [ 288.737013] ? save_stack+0xa9/0xd0 [ 288.741234] 0 [ 288.744994] ? save_stack+0x43/0xd0 [ 288.745008] ? kasan_kmalloc+0xc4/0xe0 [ 288.745021] ? __kmalloc+0x14e/0x760 [ 288.745034] ? ext4_find_extent+0x6f3/0x960 [ 288.745051] ? ext4_ext_map_blocks+0x28a/0x6270 [ 288.751395] ? ext4_map_blocks+0x8d9/0x1b40 [ 288.751408] ? ext4_getblk+0x105/0x600 [ 288.751419] ? ext4_bread+0x8d/0x2a0 [ 288.751435] ? ext4_append+0x14e/0x370 [ 288.756357] Node 0 [ 288.760733] ? ext4_mkdir+0x52a/0xe50 [ 288.760746] ? vfs_mkdir+0x42e/0x6b0 [ 288.760762] ? do_mkdirat+0x266/0x2f0 [ 288.790303] DMA: [ 288.794311] ? __x64_sys_mkdir+0x5c/0x80 [ 288.794325] ? do_syscall_64+0x1b1/0x800 [ 288.794343] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.799798] 1*4kB [ 288.802862] ? save_stack+0xa9/0xd0 [ 288.802877] ? print_usage_bug+0xc0/0xc0 [ 288.802895] ? graph_lock+0x170/0x170 [ 288.807032] (U) [ 288.811406] ? __lock_is_held+0xb5/0x140 [ 288.811421] ? ext4_bread+0x8d/0x2a0 [ 288.811452] ? __lock_is_held+0xb5/0x140 [ 288.813246] 0*8kB [ 288.817637] ? rcu_read_lock_sched_held+0x108/0x120 [ 288.817653] ? __kmalloc+0x5f9/0x760 [ 288.822144] 0*16kB [ 288.823922] ? ext4_find_extent+0x6f3/0x960 [ 288.823946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.828356] 1*32kB [ 288.832476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.832490] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 288.832515] ext4_ext_map_blocks+0x2d63/0x6270 [ 288.837032] (U) [ 288.838803] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 288.838821] ? perf_trace_lock+0x900/0x900 [ 288.843743] 2*64kB [ 288.848038] ? perf_trace_lock+0x900/0x900 [ 288.848051] ? find_held_lock+0x36/0x1c0 [ 288.848071] ? zap_class+0x720/0x720 [ 288.851689] (U) [ 288.853466] ? graph_lock+0x170/0x170 [ 288.853480] ? lock_downgrade+0x8e0/0x8e0 [ 288.853499] ? graph_lock+0x170/0x170 [ 288.857116] 1*128kB [ 288.860989] ? lock_acquire+0x1dc/0x520 [ 288.861005] ? ext4_map_blocks+0x871/0x1b40 [ 288.864710] (U) [ 288.869003] ? lock_release+0xa10/0xa10 [ 288.869024] ? rcu_note_context_switch+0x710/0x710 [ 288.869052] ? down_write+0x87/0x120 [ 288.873710] 1*256kB [ 288.878008] ext4_map_blocks+0x8d9/0x1b40 [ 288.878025] ? __save_stack_trace+0x7e/0xd0 [ 288.878049] ? ext4_issue_zeroout+0x190/0x190 [ 288.881921] (U) [ 288.885953] ? save_stack+0x43/0xd0 [ 288.885966] ? __kasan_slab_free+0x11a/0x170 [ 288.885981] ? kmem_cache_free+0x86/0x2d0 [ 288.889861] 0*512kB [ 288.892072] ? putname+0xf2/0x130 [ 288.892090] ext4_getblk+0x105/0x600 [ 288.892109] ? ext4_iomap_begin+0x1330/0x1330 [ 288.895898] 1*1024kB [ 288.899580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.899594] ? __dquot_initialize+0x615/0xdc0 [ 288.899610] ? kasan_check_write+0x14/0x20 [ 288.903401] (U) [ 288.905434] ext4_bread+0x8d/0x2a0 [ 288.905449] ? ext4_getblk+0x600/0x600 [ 288.905466] ? dquot_get_next_dqblk+0x180/0x180 [ 288.909517] 1*2048kB [ 288.913550] ? kasan_check_write+0x14/0x20 [ 288.913579] ext4_append+0x14e/0x370 [ 288.918944] (M) [ 288.921072] ext4_mkdir+0x52a/0xe50 [ 288.921099] ? ext4_init_dot_dotdot+0x510/0x510 [ 288.924723] 3*4096kB [ 288.928757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.928772] ? security_inode_permission+0xd2/0x100 [ 288.928789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.932578] (M) [ 288.934535] ? security_inode_mkdir+0xe8/0x120 [ 288.934550] ? getname_flags+0xd0/0x5a0 [ 288.934568] vfs_mkdir+0x42e/0x6b0 [ 288.938620] = 15908kB [ 288.942302] do_mkdirat+0x266/0x2f0 [ 288.942327] ? __ia32_sys_mknod+0xb0/0xb0 [ 288.946378] Node 0 [ 288.948498] ? ksys_ioctl+0x81/0xd0 [ 288.948513] ? do_syscall_64+0x92/0x800 [ 288.948531] __x64_sys_mkdir+0x5c/0x80 [ 288.953537] DMA32: [ 288.957216] do_syscall_64+0x1b1/0x800 [ 288.957231] ? finish_task_switch+0x1ca/0x840 [ 288.957249] ? syscall_return_slowpath+0x5c0/0x5c0 [ 288.959482] 2*4kB [ 288.963767] ? syscall_return_slowpath+0x30f/0x5c0 [ 288.963785] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 288.963807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.969331] (M) [ 288.971541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.971552] RIP: 0033:0x454e37 [ 288.971559] Code: [ 288.977099] 3*8kB [ 288.982069] 1f 40 00 b8 5a 00 [ 288.986693] (UM) [ 288.988624] 00 00 0f 05 48 3d 01 [ 288.993669] 1*16kB [ 288.997856] f0 ff ff 0f 83 cd c5 [ 289.000125] (U) [ 289.004314] fb ff c3 66 2e 0f 1f [ 289.008407] 4*32kB [ 289.012072] 84 00 00 00 00 00 66 [ 289.014078] (M) [ 289.017832] 90 b8 53 00 00 00 0f [ 289.022029] 3*64kB [ 289.025764] 05 <48> 3d 01 f0 ff ff [ 289.028121] (UM) [ 289.032059] 0f 83 ad c5 fb ff c3 [ 289.036412] 4*128kB [ 289.038341] 66 2e 0f 1f 84 00 00 [ 289.042344] (M) [ 289.047227] 00 00 [ 289.047245] RSP: 002b:00007fb75f4daba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 289.047265] RAX: ffffffffffffffda RBX: 0000000020000750 RCX: 0000000000454e37 [ 289.051078] 3*256kB [ 289.053358] RDX: 0000000000000015 RSI: 00000000000001ff RDI: 0000000020000240 [ 289.053368] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 289.053377] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 289.053389] R13: 0000000000000000 R14: 00000000004d2d10 R15: 000000000000001d [ 289.057529] (UM) 3*512kB (UM) 5*1024kB (UM) 3*2048kB (UM) 704*4096kB (M) = 2898032kB [ 289.357324] Node 0 Normal: 84*4kB (UME) 3411*8kB (UME) 2897*16kB (UME) 2200*32kB (UME) 1218*64kB (UME) 466*128kB (UM) 129*256kB (UM) 26*512kB (UM) 10*1024kB (UM) 9*2048kB (UME) 468*4096kB (UM) = 2273912kB [ 289.375848] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 289.384458] 22010 total pagecache pages [ 289.388485] 0 pages in swap cache [ 289.391970] Swap cache stats: add 0, delete 0, find 0/0 [ 289.397366] Free swap = 0kB [ 289.400411] Total swap = 0kB [ 289.403471] 1965969 pages RAM [ 289.406605] 0 pages HighMem/MovableOnly [ 289.410613] 340001 pages reserved [ 289.414090] ------------[ cut here ]------------ [ 289.418879] heap->ops->map_kernel should return ERR_PTR on error [ 289.419208] WARNING: CPU: 0 PID: 19390 at drivers/staging/android/ion/ion.c:148 ion_dma_buf_begin_cpu_access+0x48e/0x5a0 [ 289.436337] Kernel panic - not syncing: panic_on_warn set ... [ 289.436337] [ 289.443702] CPU: 0 PID: 19390 Comm: syz-executor3 Not tainted 4.17.0+ #93 [ 289.450621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.459964] Call Trace: [ 289.462551] dump_stack+0x1b9/0x294 [ 289.466186] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.471385] ? ion_dma_buf_begin_cpu_access+0x3d0/0x5a0 [ 289.476752] panic+0x22f/0x4de [ 289.479968] ? add_taint.cold.5+0x16/0x16 [ 289.484120] ? __warn.cold.8+0x148/0x1b3 [ 289.488207] ? ion_dma_buf_begin_cpu_access+0x48e/0x5a0 [ 289.493571] __warn.cold.8+0x163/0x1b3 [ 289.497464] ? ion_dma_buf_begin_cpu_access+0x48e/0x5a0 [ 289.502830] report_bug+0x252/0x2d0 [ 289.506465] do_error_trap+0x1fc/0x4d0 [ 289.510358] ? math_error+0x3f0/0x3f0 [ 289.514163] ? vprintk_default+0x28/0x30 [ 289.518221] ? vprintk_func+0x81/0xe7 [ 289.522026] ? printk+0x9e/0xba [ 289.525312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.530165] do_invalid_op+0x1b/0x20 [ 289.533875] invalid_op+0x14/0x20 [ 289.537329] RIP: 0010:ion_dma_buf_begin_cpu_access+0x48e/0x5a0 [ 289.543287] Code: ff 41 bc ea ff ff ff 89 de e8 8e b0 ba fb 84 db 75 a8 e8 b5 af ba fb 48 c7 c7 00 05 68 88 c6 05 39 8d d9 03 01 e8 02 c7 86 fb <0f> 0b eb 8c 48 c7 c7 40 09 ef 88 e8 12 a3 f7 fb e9 15 ff ff ff e8 [ 289.562695] RSP: 0018:ffff8801c7bdfb08 EFLAGS: 00010286 [ 289.568057] RAX: 0000000000000034 RBX: 0000000000000000 RCX: ffffc900042ce000 [ 289.575325] RDX: 0000000000040000 RSI: ffffffff8161f4e1 RDI: ffff8801c7bdf7e0 [ 289.582589] RBP: ffff8801c7bdfb60 R08: ffff88018977c380 R09: 0000000000000006 [ 289.589860] R10: ffff88018977c380 R11: 0000000000000000 R12: 00000000ffffffea [ 289.597129] R13: ffff8801ae71af48 R14: 0000000000000001 R15: ffffffff89724b80 [ 289.604430] ? vprintk_func+0x81/0xe7 [ 289.608242] ? ion_dma_buf_begin_cpu_access+0x48e/0x5a0 [ 289.613610] ? ion_dma_buf_end_cpu_access+0x4a0/0x4a0 [ 289.618802] dma_buf_begin_cpu_access+0x7f/0x160 [ 289.623583] dma_buf_ioctl+0x1aa/0x240 [ 289.627475] ? dma_buf_begin_cpu_access+0x160/0x160 [ 289.632495] ? wait_for_completion+0x870/0x870 [ 289.637080] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 289.642270] ? dma_buf_begin_cpu_access+0x160/0x160 [ 289.647295] do_vfs_ioctl+0x1cf/0x16f0 [ 289.651188] ? ioctl_preallocate+0x2e0/0x2e0 [ 289.655597] ? fget_raw+0x20/0x20 [ 289.659055] ? __sb_end_write+0xac/0xe0 [ 289.663038] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.668574] ? fput+0x130/0x1a0 [ 289.671856] ? ksys_write+0x1a6/0x250 [ 289.675660] ? security_file_ioctl+0x94/0xc0 [ 289.680073] ksys_ioctl+0xa9/0xd0 [ 289.683528] __x64_sys_ioctl+0x73/0xb0 [ 289.687417] do_syscall_64+0x1b1/0x800 [ 289.691304] ? finish_task_switch+0x1ca/0x840 [ 289.695802] ? syscall_return_slowpath+0x5c0/0x5c0 [ 289.700733] ? syscall_return_slowpath+0x30f/0x5c0 [ 289.705663] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 289.711031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.715878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.721077] RIP: 0033:0x4559f9 [ 289.724255] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.743777] RSP: 002b:00007ffa9befbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.751486] RAX: ffffffffffffffda RBX: 00007ffa9befc6d4 RCX: 00000000004559f9 [ 289.758764] RDX: 0000000020000080 RSI: 0000000040086200 RDI: 0000000000000015 [ 289.766029] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 289.773294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 289.780559] R13: 00000000004bca98 R14: 00000000004ca6d0 R15: 0000000000000000 [ 289.788554] Dumping ftrace buffer: [ 289.792106] (ftrace buffer empty) [ 289.795795] Kernel Offset: disabled [ 289.799404] Rebooting in 86400 seconds..