Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2020/03/24 14:48:01 fuzzer started 2020/03/24 14:48:02 dialing manager at 10.128.0.26:37265 2020/03/24 14:48:02 syscalls: 2999 2020/03/24 14:48:02 code coverage: enabled 2020/03/24 14:48:02 comparison tracing: enabled 2020/03/24 14:48:02 extra coverage: enabled 2020/03/24 14:48:02 setuid sandbox: enabled 2020/03/24 14:48:02 namespace sandbox: enabled 2020/03/24 14:48:02 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/24 14:48:02 fault injection: enabled 2020/03/24 14:48:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/24 14:48:02 net packet injection: enabled 2020/03/24 14:48:02 net device setup: enabled 2020/03/24 14:48:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/24 14:48:02 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:49:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1a9f, 0x20582) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000280)=@urb_type_interrupt={0x12, {}, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:49:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x6c) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffe, 0x8060, 0x0, 0x4000000000000) [ 154.816834][ T8587] IPVS: ftp: loaded support on port[0] = 21 14:49:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x8, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote={0xac, 0x14, 0x8}}, @timestamp}}}, 0x100c) [ 154.992369][ T8590] IPVS: ftp: loaded support on port[0] = 21 [ 155.019867][ T8587] chnl_net:caif_netlink_parms(): no params data found [ 155.148480][ T8587] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.155604][ T8587] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.178318][ T8587] device bridge_slave_0 entered promiscuous mode [ 155.198293][ T8587] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.205468][ T8587] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.215475][ T8587] device bridge_slave_1 entered promiscuous mode 14:49:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r2, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000200)=""/203, 0xcb}], 0x2, 0x79) [ 155.245316][ T8595] IPVS: ftp: loaded support on port[0] = 21 [ 155.276104][ T8587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.320718][ T8587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.389692][ T8590] chnl_net:caif_netlink_parms(): no params data found [ 155.413538][ T8587] team0: Port device team_slave_0 added [ 155.441560][ T8587] team0: Port device team_slave_1 added 14:49:34 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f000083f000/0x1000)=nil, 0x1000) [ 155.527589][ T8587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 155.534595][ T8587] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.563215][ T8587] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 155.590790][ T8587] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 155.607332][ T8587] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.607358][ T8587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 155.617033][ T8598] IPVS: ftp: loaded support on port[0] = 21 [ 155.701537][ T8595] chnl_net:caif_netlink_parms(): no params data found [ 155.780304][ T8587] device hsr_slave_0 entered promiscuous mode 14:49:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x6c) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000), 0xfffffffe, 0x8060, 0x0, 0xa) [ 155.867618][ T8587] device hsr_slave_1 entered promiscuous mode [ 155.937289][ T8590] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.944447][ T8590] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.952210][ T8590] device bridge_slave_0 entered promiscuous mode [ 155.977703][ T8590] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.984799][ T8590] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.992725][ T8590] device bridge_slave_1 entered promiscuous mode [ 156.035637][ T8604] IPVS: ftp: loaded support on port[0] = 21 [ 156.038544][ T8606] IPVS: ftp: loaded support on port[0] = 21 [ 156.084184][ T8590] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.121422][ T8590] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.154309][ T8590] team0: Port device team_slave_0 added [ 156.163574][ T8590] team0: Port device team_slave_1 added [ 156.223246][ T8590] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.230279][ T8590] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.256343][ T8590] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.267500][ T8595] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.274647][ T8595] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.284003][ T8595] device bridge_slave_0 entered promiscuous mode [ 156.308538][ T8590] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.315714][ T8590] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.346300][ T8590] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 156.358723][ T8598] chnl_net:caif_netlink_parms(): no params data found [ 156.373041][ T8595] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.380413][ T8595] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.388835][ T8595] device bridge_slave_1 entered promiscuous mode [ 156.469064][ T8590] device hsr_slave_0 entered promiscuous mode [ 156.527488][ T8590] device hsr_slave_1 entered promiscuous mode [ 156.607326][ T8590] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 156.615280][ T8590] Cannot create hsr debugfs directory [ 156.691305][ T8598] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.698736][ T8598] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.706506][ T8598] device bridge_slave_0 entered promiscuous mode [ 156.721510][ T8595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.759690][ T8598] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.766791][ T8598] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.776787][ T8598] device bridge_slave_1 entered promiscuous mode [ 156.788903][ T8595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.835288][ T8606] chnl_net:caif_netlink_parms(): no params data found [ 156.865810][ T8595] team0: Port device team_slave_0 added [ 156.872459][ T8604] chnl_net:caif_netlink_parms(): no params data found [ 156.889968][ T8598] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.900470][ T8587] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 156.951035][ T8595] team0: Port device team_slave_1 added [ 156.956835][ T8587] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 157.004485][ T8587] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 157.061426][ T8587] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 157.099765][ T8598] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.160778][ T8598] team0: Port device team_slave_0 added [ 157.166853][ T8595] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.174063][ T8595] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.200337][ T8595] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 157.233454][ T8598] team0: Port device team_slave_1 added [ 157.252996][ T8595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 157.262099][ T8595] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.289426][ T8595] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.312521][ T8598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.319812][ T8598] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.345889][ T8598] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 157.375783][ T8598] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 157.383211][ T8598] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.410294][ T8598] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.478363][ T8606] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.485479][ T8606] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.493997][ T8606] device bridge_slave_0 entered promiscuous mode [ 157.501905][ T8590] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 157.590312][ T8595] device hsr_slave_0 entered promiscuous mode [ 157.627694][ T8595] device hsr_slave_1 entered promiscuous mode [ 157.667373][ T8595] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 157.674997][ T8595] Cannot create hsr debugfs directory [ 157.682311][ T8604] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.689486][ T8604] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.698941][ T8604] device bridge_slave_0 entered promiscuous mode [ 157.706504][ T8606] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.713699][ T8606] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.724122][ T8606] device bridge_slave_1 entered promiscuous mode [ 157.740189][ T8590] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 157.812796][ T8590] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 157.876012][ T8590] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 157.929259][ T8604] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.936387][ T8604] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.944257][ T8604] device bridge_slave_1 entered promiscuous mode [ 157.962270][ T8606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.020510][ T8598] device hsr_slave_0 entered promiscuous mode [ 158.057627][ T8598] device hsr_slave_1 entered promiscuous mode [ 158.097736][ T8598] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 158.105404][ T8598] Cannot create hsr debugfs directory [ 158.112721][ T8606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.152778][ T8604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.205960][ T8604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.226001][ T8606] team0: Port device team_slave_0 added [ 158.235043][ T8606] team0: Port device team_slave_1 added [ 158.278966][ T8604] team0: Port device team_slave_0 added [ 158.305945][ T8587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.316450][ T8604] team0: Port device team_slave_1 added [ 158.335797][ T8606] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.343496][ T8606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.370053][ T8606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.409459][ T8606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.416439][ T8606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.442854][ T8606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.454363][ T8604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.463683][ T8604] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.490269][ T8604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.503748][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.512270][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.523149][ T8587] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.544637][ T8604] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.551996][ T8604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.578442][ T8604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.591869][ T8590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.623702][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.636011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.644993][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.652271][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.662006][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.671471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.680164][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.687293][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.694770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.704087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.721366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.769069][ T8604] device hsr_slave_0 entered promiscuous mode [ 158.807532][ T8604] device hsr_slave_1 entered promiscuous mode [ 158.877355][ T8604] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 158.884951][ T8604] Cannot create hsr debugfs directory [ 158.950181][ T8606] device hsr_slave_0 entered promiscuous mode [ 158.997606][ T8606] device hsr_slave_1 entered promiscuous mode [ 159.037328][ T8606] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 159.044957][ T8606] Cannot create hsr debugfs directory [ 159.058991][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.071671][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.082163][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.091546][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.106743][ T8595] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 159.173026][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.183233][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.191626][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.203072][ T8595] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 159.265817][ T8595] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 159.322494][ T8595] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 159.375120][ T8590] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.382948][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.391949][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.442676][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.452539][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.466567][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.513884][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.523641][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.534904][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.542546][ T2969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.551046][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.559758][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.568284][ T2969] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.575335][ T2969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.590693][ T8598] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 159.649009][ T8598] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 159.705995][ T8598] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 159.763120][ T8598] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 159.831501][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.839630][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.848517][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.862541][ T8587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.896145][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.904030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.955219][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.964529][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.973423][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.006163][ T8604] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 160.054790][ T8604] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 160.110528][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.119613][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.129168][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.137953][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.146556][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.154998][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.165568][ T8590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.181753][ T8604] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 160.239286][ T8604] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 160.294744][ T8606] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 160.322031][ T8606] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 160.380119][ T8606] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 160.440772][ T8606] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 160.509044][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 160.520681][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.530621][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 160.538366][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 160.562451][ T8595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.597851][ T8590] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.612845][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.621287][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.633624][ T8595] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.664212][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.672652][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.684749][ T8587] device veth0_vlan entered promiscuous mode [ 160.712191][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.720793][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.729360][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.739256][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.748048][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.755198][ T2969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.762926][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.771912][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.780771][ T2969] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.787917][ T2969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.796493][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.812222][ T8587] device veth1_vlan entered promiscuous mode [ 160.832383][ T8598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.845732][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 160.854724][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.863119][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.871828][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 160.882078][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.922364][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.934400][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.943739][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.952702][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.973106][ T8598] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.985395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.995335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.006310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.014920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.023418][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.031820][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.043544][ T8590] device veth0_vlan entered promiscuous mode [ 161.065214][ T8587] device veth0_macvtap entered promiscuous mode [ 161.073697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.082258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.090848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.099839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.108844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.119438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.127923][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.134970][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.142786][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.153295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.161847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.170646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.179089][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.186362][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.194606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.202600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 161.221002][ T8604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.234754][ T8587] device veth1_macvtap entered promiscuous mode [ 161.243034][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.253671][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.278455][ T8590] device veth1_vlan entered promiscuous mode [ 161.298030][ T8604] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.305281][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 161.313991][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.326039][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.335080][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.343846][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.352905][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.361394][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.369685][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.377559][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.385844][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.400261][ T8598] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.413414][ T8598] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.431007][ T8606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.451149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 161.460733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.469211][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.477584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.485848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.494257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.535644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.544527][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.552769][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.562901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.571435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.580068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.588929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.597672][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.604739][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.612990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.620980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.633144][ T8598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.646666][ T8587] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.658582][ T8606] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.669893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.678721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.687645][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.696632][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.706247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.715290][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.723413][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.731272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 161.739075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 161.747632][ T8590] device veth0_macvtap entered promiscuous mode [ 161.759417][ T8590] device veth1_macvtap entered promiscuous mode [ 161.775387][ T8595] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.792544][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 161.801872][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.812988][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.824131][ T8587] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.852563][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.861922][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.874581][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.883328][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.892309][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.903195][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.910478][ T2969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.949112][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.959068][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.969843][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.980183][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.989655][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.998635][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.007568][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.016175][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.026192][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.035012][ T2968] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.042157][ T2968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.050153][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.059728][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.068844][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.141258][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.153955][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.162814][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.172327][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.181110][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.193441][ T8590] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 162.206393][ T8590] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.218376][ T8590] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 162.230986][ T8590] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 162.244511][ T8590] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 162.255946][ T8590] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 162.318489][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.326905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.335518][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 162.345461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.354610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.363266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.372079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 162.381002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.391590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.400315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.409004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.418372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.426801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.436809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.445789][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.454569][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.514017][ T8595] device veth0_vlan entered promiscuous mode [ 162.534034][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.542950][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.556251][ T8606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.640590][ T8598] device veth0_vlan entered promiscuous mode [ 162.650356][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.668269][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.676091][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 14:49:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000613756ca1fdec1cb8e17cda153ad0726c89cdaceec68f0d9a3b3ecf09b358159c3273494be17dbfe5c89a7a3da82c7c281f50a0f60206d0e9a4f04ecdf23fe38034b25b3378ebfba332eb9a44406e023c2c1467e079d39e91b0401818513f81839e262c27ed72705f0207d917e7b1314227b002049aa5da6965c5d8bcb7139c535ab17363c1947301ac0f2418894458e2ef584d4e3887d81651e"], &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x212, 0x10, &(0x7f0000000000), 0xfffffffffffffea8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x123, 0xe, 0x0, &(0x7f0000000000)="7c16eb8c75c193cc4d00ed1259e7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 162.706396][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.715096][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.723008][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:49:42 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],[::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 162.781174][ T8595] device veth1_vlan entered promiscuous mode [ 162.801502][ T8598] device veth1_vlan entered promiscuous mode [ 162.816852][ T8604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.867695][ T8633] libceph: Failed to parse monitor IPs: -22 14:49:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a09140000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a32000000002c0003801800038014000100766c616e3000000000000000000000000800024000000000080001400000000014000000020a0500000000001900000000000000b40000001100010000000000000000000000000a"], 0xb4}}, 0x0) [ 162.910671][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 162.940208][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 162.960889][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.970020][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.998124][ T8595] device veth0_macvtap entered promiscuous mode 14:49:42 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/18, 0x33c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000015) [ 163.013181][ T8598] device veth0_macvtap entered promiscuous mode [ 163.045739][ T8606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.062838][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.074216][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.084971][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.093990][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.104335][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 163.123279][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 163.136885][ T8595] device veth1_macvtap entered promiscuous mode [ 163.161487][ T8598] device veth1_macvtap entered promiscuous mode [ 163.193552][ T8595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 163.205095][ T8595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.216226][ T8595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 14:49:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x270, 0x270, 0x270, 0x270, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@uncond, 0x0, 0x228, 0x270, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'gre0\x00', {0x0, 0x7fff, 0x0, 0x0, 0x103, 0x55a, 0x8}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @loopback, [], [], 'wg0\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 163.234651][ T8595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.253127][ T8595] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 163.291581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.305729][ T8655] xt_CT: You must specify a L4 protocol and not use inversions on it [ 163.316805][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.325063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 14:49:42 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000280)) getpid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 163.334479][ T8658] xt_CT: You must specify a L4 protocol and not use inversions on it [ 163.334682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.365861][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 163.378432][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.397949][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 163.411401][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.421736][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 163.432843][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.449290][ T8598] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 163.469017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.479194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.489036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.497955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.521966][ T8595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.533996][ T8595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.551887][ C0] hrtimer: interrupt took 26280 ns [ 163.565841][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 163.567857][ T8595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.573084][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 163.588909][ T8595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.600212][ T8664] ceph: No mds server is up or the cluster is laggy [ 163.608613][ T8595] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.623741][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 163.630819][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.638879][ T2762] libceph: mon0 (1)[d::]:6789 connect error [ 163.645834][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.654538][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.663440][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.675284][ T8604] device veth0_vlan entered promiscuous mode [ 163.693520][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.705233][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.715171][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 163.725733][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.735752][ T8598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 14:49:43 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SOUND_PCM_READ_RATE(0xffffffffffffffff, 0x80045002, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 163.746243][ T8598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 163.763792][ T8598] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 163.778323][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.786144][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.798185][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.806931][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.830553][ T8604] device veth1_vlan entered promiscuous mode [ 163.854508][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 163.873255][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.883213][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 14:49:43 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030009009e40f086dd1fffffe100000900632f77fbac141412e4000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42459416a2e10c91196b1fd38f20b33", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffd4e, 0x3f, &(0x7f00000003c0)="72f96c45dbbfc718cb63c344dc932c35b23ac7a55a84b29e1150c8c6d937a55799784a2898bcba36e772a1"}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 163.963829][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 163.987685][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.996247][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.023275][ T8606] device veth0_vlan entered promiscuous mode [ 164.135475][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.144835][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.185895][ T8604] device veth0_macvtap entered promiscuous mode [ 164.241099][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.253748][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.264743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.281735][ T8604] device veth1_macvtap entered promiscuous mode [ 164.339349][ T8606] device veth1_vlan entered promiscuous mode [ 164.483536][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.495008][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.506001][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.520061][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.530436][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.543897][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.554399][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.565333][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.577045][ T8604] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 164.585474][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 164.597889][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.605903][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.617509][ T2762] libceph: mon0 (1)[d::]:6789 connect error [ 164.626618][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.635809][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.645073][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.668833][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.680009][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.690948][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.701938][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.712342][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.722913][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.733290][ T8604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.744906][ T8604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.756273][ T8604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 164.776603][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.786413][ T2762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.814708][ T8606] device veth0_macvtap entered promiscuous mode [ 164.827000][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.841694][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.891785][ T8606] device veth1_macvtap entered promiscuous mode [ 164.903645][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.913150][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.035916][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.051657][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.064152][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.077430][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.089715][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.100366][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.110501][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.121848][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.132134][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.142848][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.154629][ T8606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.167397][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.175945][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.189605][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.201614][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.232117][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.251406][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.261867][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.277359][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.287811][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.304300][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.314295][ T8606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 14:49:44 executing program 2: r0 = syz_open_dev$dri(0x0, 0x0, 0x143000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x10002, 0xa, 0xd9, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000100)={r3}) dup2(r1, r2) 14:49:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:49:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r2, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000200)=""/203, 0xcb}], 0x2, 0x79) [ 165.325024][ T8606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.336996][ T8606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.362067][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.383763][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.542198][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 165.558956][ T2762] libceph: mon0 (1)[d::]:6789 connect error 14:49:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2e83c4, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r1}) 14:49:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) 14:49:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200001a000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000ef2d30ed9e9ae396fcc43020ed7dbc3b7c3fd06c3aed8a89b59c71aad05c6c0fe8111ce33e7e87078ba2050964142a196431429b00c81a7a2ced6159b8161fdfbed7c308888292168cd531cc41e842a7f9b51e354ffc417dead09f3c644111734cac40b4bcfc7f9b5a5a95a39792e55a217b68e3ce39dfeb73039b4737a82c1641ad6c67145452058be60d8b8126ab1cfe25c76c52b5f2a2fd68237547778c8935751b8d074f4db80830104000000000000a2924fcc527987707003b166dd5651e3ffcf9b819bfde18bcef0e3cfb349db8730de7ba6c1b33ede7e36eaa07e7e5629a1ccab3d4c594db717159c20e010431c614e5ee7fff0793d5faf1d8a8fcbeda73aa23a8cc35a3b9b4cef71cf6b3898cfb04e3a0e4b4f84551764beb6860844a2ab1e94fc9763dc9799000000000000000000000100000000000000000000c5e6f5957c81b8932ec22023643d929a568ad3005586b0cb37a38a7d0ba6365b482d521436b558f07a8569d212e8e4f1707e9bc7d548e621eb37a8f0452cd717403899bcd00fdf9250b2b2858802a80fa6b719bfcffba0a244c1ec30e417a2e9bdea6b2cefd391b1ccc172627cfb7dbcff409678b4ce56042b4d94ca25029cb422e5d1906907ff4a43382570d87212f1b706ace7e533a5e98e1630d4314337579dcaa57265f41e98b2a6a401c6eb6d717aeea5377577beeac64c7419125dba0458359cdac66b989fef65af77cb5a9a1ec40d66e7523a742501c1f6fa3d51c63f900039f3f164e82d126d27e3d3626e91e3de8c42ad4ece06b714eb43b8e046246efd9dcf1e2701fcb8f741ab428a37591e671ad9a3570fde47ef95cfb09360ccb773a79ad61e1dd03fad331e051efa0495e02542dad59f6468d58e48f5b3e978af01ce8e3021c82c30d7ab7d09cf2f9eb55c6d4b92823c942077c752f5b4feaa1f90bbb5e98373252804d76671bbc73a1718594a79e83c7343a5500971439123cfd278184e4fe8973efb2caf70ecfc7034fdfd7d1dc2f78f745d2ac9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030009009e40f086dd1fffffe100000900632f77fbac141412e4000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42459416a2e10c91196b1fd38f20b33", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffd4e, 0x3f, &(0x7f00000003c0)="72f96c45dbbfc718cb63c344dc932c35b23ac7a55a84b29e1150c8c6d937a55799784a2898bcba36e772a1"}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 14:49:44 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 14:49:44 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x10, 0x3, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x420000, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff, 0x0, 0x0, 0x0, 0x401}, &(0x7f0000000440)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 165.696005][ T8723] serio: Serial port pts0 14:49:45 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 165.882138][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 165.884036][ T8741] tmpfs: Bad value for 'mpol' [ 165.899327][ T2762] libceph: mon0 (1)[d::]:6789 connect error [ 165.908052][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 165.914112][ T2762] libceph: mon0 (1)[d::]:6789 connect error 14:49:45 executing program 5: ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f00000001c0)="0f21e60f9e4b000fae400a66b9800000c00f326635008000000f3066b8908c238766efbafc0c66edd3c90f0fc28e0f01ca0f01c50f4536e50e260f01c9", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$tun(r1, &(0x7f0000000000)={@void, @val={0x2, 0x0, 0x7, 0xa4, 0x0, 0x8000}, @eth={@random="909e5850eb8d", @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @dev={[], 0x43}, @rand_addr, @dev={[], 0x22}, @local}}}}}, 0x34) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cf]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) [ 165.942187][ T8741] tmpfs: Bad value for 'mpol' [ 165.990577][ T8748] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 166.476318][ T8722] ceph: No mds server is up or the cluster is laggy [ 166.494170][ T8759] serio: Serial port pts0 [ 166.511373][ T2761] libceph: connect (1)[d::]:6789 error -101 [ 166.526141][ T2761] libceph: mon0 (1)[d::]:6789 connect error [ 167.539790][ T2969] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 168.500828][ T2968] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 169.539928][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 169.546067][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 170.500784][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 170.506798][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 171.538327][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 171.544410][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 173.537708][ T2969] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 175.541721][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 175.549414][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 176.507761][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 176.513779][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 177.540895][ T2969] libceph: connect (1)[d::]:6789 error -101 [ 177.546908][ T2969] libceph: mon0 (1)[d::]:6789 connect error [ 179.538155][ T2968] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 181.538166][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 181.544184][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 182.498888][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 182.505014][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 183.540133][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 183.546114][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 185.537660][ T2968] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 187.543711][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 187.549789][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 188.499882][ T2969] libceph: connect (1)[d::]:6789 error -101 [ 188.505876][ T2969] libceph: mon0 (1)[d::]:6789 connect error [ 189.539658][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 189.545673][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 191.543248][ T2968] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 193.540660][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 193.546607][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 194.501459][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 194.507442][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 195.538680][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 195.544635][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 196.499123][ T2968] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 198.577706][ T2953] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 199.540397][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 199.546342][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 200.500432][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 200.506409][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 201.537541][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 201.543519][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 203.538019][ T2953] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 205.541843][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 205.547914][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 206.507451][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 206.513405][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 207.541502][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 207.547567][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 209.537739][ T2953] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 211.549028][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 211.555044][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 212.500650][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 212.506644][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 213.540278][ T2968] libceph: connect (1)[d::]:6789 error -101 [ 213.546235][ T2968] libceph: mon0 (1)[d::]:6789 connect error [ 215.537778][ T2953] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 217.543386][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 217.549474][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 218.499390][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 218.505378][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 219.542110][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 219.548113][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 221.538166][ T2953] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 223.540835][ T2953] libceph: connect (1)[d::]:6789 error -101 [ 223.546796][ T2953] libceph: mon0 (1)[d::]:6789 connect error [ 223.785102][ T8665] ceph: No mds server is up or the cluster is laggy [ 223.801817][ T2762] libceph: connect (1)[d::]:6789 error -101 [ 223.807837][ T2762] libceph: mon0 (1)[d::]:6789 connect error [ 223.814021][ T8673] ceph: No mds server is up or the cluster is laggy 14:50:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003b40)=[{{0x0, 0x1010000, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 14:50:43 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SOUND_PCM_READ_RATE(0xffffffffffffffff, 0x80045002, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e67010000803b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69503000000107eafa89021a7503aaec0b01542ab79d2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d1550397f843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb00637016a64bb61aeeb5f0c68633885eab5fd515470e2f3fb317a9629b815e701bdb1e59e0098cf2aea52f9f0c77f1c30b6ebcd4d5c3e29604823b8140d9a9b2af0e17be62d5225a4343706d8cd7a4d192d0c7cef5a373b04fe64d6b44675e6de9fca763b0d16d7c343ae8f380468136c187a6283ed22658410c5e8d8a9d9d4d09a564f69d80acd71f1eb451b090b4b71eac2b4f38509e27fba3419360c19cdef1eff7587a6a94e29e5185b233a8f80c9a2a2bd4e170ac49b43aac47bdc3c7eea029ece90e20a1a3c594c82c4855b180ca1c1cc5611387abe9b14237d828c42661a8bc6ad8bf3425"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 14:50:43 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f00000001c0)="0f21e60f9e4b000fae400a66b9800000c00f326635008000000f3066b8908c238766efbafc0c66edd3c90f0fc28e0f01ca0f01c50f4536e50e260f01c9", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cf]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:50:43 executing program 4: r0 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)=',', 0x1, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000440)="bc", 0x1) 14:50:43 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 224.325896][ T8770] tmpfs: Bad value for 'mpol' [ 224.353195][ T8771] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:50:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 14:50:43 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:43 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velin', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) [ 224.615144][ T8789] tmpfs: Bad value for 'mpol' 14:50:43 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:43 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x2000000) [ 224.660908][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 224.660917][ T27] audit: type=1800 audit(1585061443.912:31): pid=8795 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16554 res=0 [ 224.773609][ T27] audit: type=1800 audit(1585061444.022:32): pid=8795 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16554 res=0 14:50:44 executing program 5: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000300)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x3f00000000000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 224.825890][ T8801] tmpfs: Bad value for 'mpol' 14:50:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x2, &(0x7f0000000000)) [ 225.161838][ T8774] ceph: No mds server is up or the cluster is laggy [ 226.187548][ T398] tipc: TX() has been purged, node left! [ 227.256182][ T8842] IPVS: ftp: loaded support on port[0] = 21 [ 227.506047][ T8842] chnl_net:caif_netlink_parms(): no params data found [ 227.541385][ T8842] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.548929][ T8842] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.556833][ T8842] device bridge_slave_0 entered promiscuous mode [ 227.564777][ T8842] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.572276][ T8842] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.581050][ T8842] device bridge_slave_1 entered promiscuous mode [ 227.596670][ T8842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.610942][ T8842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.628826][ T8842] team0: Port device team_slave_0 added [ 227.636387][ T8842] team0: Port device team_slave_1 added [ 227.651029][ T8842] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.659553][ T8842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.685595][ T8842] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.698619][ T8842] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.705553][ T8842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.731686][ T8842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.850535][ T8842] device hsr_slave_0 entered promiscuous mode [ 227.887616][ T8842] device hsr_slave_1 entered promiscuous mode [ 227.937304][ T8842] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.944890][ T8842] Cannot create hsr debugfs directory [ 228.006104][ T8842] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.013286][ T8842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.020945][ T8842] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.028045][ T8842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.131061][ T8842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.145506][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.154496][ T2968] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.162872][ T2968] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.171305][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 228.185577][ T8842] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.196935][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.205629][ T2968] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.212695][ T2968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.241295][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.250499][ T2969] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.258075][ T2969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.266169][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.275453][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.283830][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.295596][ T8842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.306878][ T8842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.314996][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.322926][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.397232][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.404600][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.415169][ T8842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.472834][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.482454][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.503256][ T8842] device veth0_vlan entered promiscuous mode [ 228.512608][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.521020][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.530760][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.539370][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.611607][ T8842] device veth1_vlan entered promiscuous mode [ 228.634247][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 228.642861][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 228.650918][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.660602][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.670740][ T8842] device veth0_macvtap entered promiscuous mode [ 228.683183][ T8842] device veth1_macvtap entered promiscuous mode [ 228.696642][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.708109][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.718016][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.728444][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.738823][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.749327][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.759675][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.770125][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.779954][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.791201][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.801095][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 228.811953][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.824370][ T8842] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 228.832862][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 228.841803][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.849677][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.858100][ T2953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.924229][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 228.934960][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.944990][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 228.955467][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.965297][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 228.976362][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 228.987057][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 228.998593][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.008441][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.018882][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.028738][ T8842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.039283][ T8842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.050231][ T8842] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 229.058582][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.067960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.491843][ T398] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 229.499570][ T398] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 229.508185][ T398] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 229.515579][ T398] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 229.525473][ T398] device bridge_slave_1 left promiscuous mode [ 229.532483][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.580243][ T398] device bridge_slave_0 left promiscuous mode [ 229.586393][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.649599][ T398] device veth1_macvtap left promiscuous mode [ 229.655773][ T398] device veth0_macvtap left promiscuous mode [ 229.662184][ T398] device veth1_vlan left promiscuous mode [ 229.668430][ T398] device veth0_vlan left promiscuous mode [ 230.117170][ T8863] ceph: No mds server is up or the cluster is laggy 14:50:49 executing program 5: 14:50:49 executing program 1: 14:50:49 executing program 2: 14:50:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:49 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 14:50:49 executing program 4: 14:50:49 executing program 2: 14:50:49 executing program 5: 14:50:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000613756ca1fdec1cb8e17cda153ad0726c89cdaceec68f0d9a3b3ecf09b358159c3273494be17dbfe5c89a7a3da82c7c281f50a0f60206d0e9a4f04ecdf23fe38034b25b3378ebfba332eb9a44406e023c2c1467e079d39e91b0401818513f81839e262c27ed72705f0207d917e7b1314227b002049aa5da6965c5d8bcb7139c535ab17363c1947301ac0f2418894458e2ef584d4e3887d81651e"], &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x212, 0x10, &(0x7f0000000000), 0xfffffffffffffea8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x123, 0xe, 0x0, &(0x7f0000000000)="7c16eb8c75c193cc4d00ed1259e7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:50:49 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 14:50:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:49 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) [ 230.402294][ T12] libceph: connect (1)[d::]:6789 error -101 [ 230.414531][ T12] libceph: mon0 (1)[d::]:6789 connect error [ 230.435669][ T12] libceph: connect (1)[d::]:6789 error -101 14:50:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000018c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x1c, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0x6, {0x81000000}}]}]}]}, 0x3c}}, 0x0) [ 230.454135][ T12] libceph: mon0 (1)[d::]:6789 connect error 14:50:49 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x3bca, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x1cb) sendmmsg$inet(r0, &(0x7f0000002a00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)='W', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f00000005c0)="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", 0x595}], 0x1}}], 0x2, 0x0) 14:50:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@gettaction={0x28, 0x32, 0x503, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}]}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = inotify_init1(0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r3, 0x3, 0xb, &(0x7f00000000c0)=""/146) fcntl$setstatus(r2, 0x4, 0x72109c5fef5d34d3) r4 = gettid() fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x0, r4}) syz_open_procfs(r4, &(0x7f0000000080)='gid_map\x00') [ 231.032208][ T8870] ceph: No mds server is up or the cluster is laggy 14:50:50 executing program 0: r0 = socket(0xa, 0xa, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @local}, 0x10) r3 = socket(0xa, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x13) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x6, 0x0) 14:50:50 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:50 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 231.258592][ T27] audit: type=1804 audit(1585061450.512:33): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir703851646/syzkaller.SoXn3z/10/file0" dev="sda1" ino=16567 res=1 14:50:50 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 231.366963][ T27] audit: type=1804 audit(1585061450.612:34): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir703851646/syzkaller.SoXn3z/10/file0" dev="sda1" ino=16567 res=1 [ 233.578603][ T398] device hsr_slave_0 left promiscuous mode [ 233.618147][ T398] device hsr_slave_1 left promiscuous mode [ 233.672820][ T398] team0 (unregistering): Port device team_slave_1 removed [ 233.684500][ T398] team0 (unregistering): Port device team_slave_0 removed [ 233.695470][ T398] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 233.752862][ T398] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 233.895160][ T398] bond0 (unregistering): Released all slaves 14:50:53 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="0000a905000000b4c1357fcd98b48c7f51b1324d85b9905c017b08b8093770f41a9020160e000000000008000000000000b6d097a3a484066c29bebdb53547d4b806ac504f39e6444deeff000da4a6f63330d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a9f6960a664fa315e30f5fb560a098e015c0a44bf736717e374e8ae1342269fabe3425f306968e7227c7fa9e20b625da6152bd35831147004d4ae86b8669a0f0ac4757e1f0caed9d957e8e8c11b7aafc1a2070686e5a3a5a9be4ed35ff8de7e31c95a30e960920689d19819b102e3354738966a5417bb959c0e0e5d1f6ecb37f932a81b9cfaec52b92eaad3ee35a6d6c2e45ef7713d1a56e8881eef8c48bc90900af9464e806034ddf4be1de714ffacb0000000000000000000003355134ea28ff2ac764ef7b309a066d3acd3d7301087a30d19375783b34a36679358066e54da23651a350754cb210c721149eb4f6935"], 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:53 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000000)={0x1, 0x5, 0x8, 0x7fffffff, 0x12, 0x3}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000180)={0x5, @pix_mp}) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000000000000600000000000000000a20000000000a01000000000004000000000000000900010073797a300000000070000000120a0100001000000000000000000000040004800900020007797a30000000000900010073797a300000000008000340020000000900020070bc7a300000000004008480040004800800034000000008140004800c0001"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 14:50:53 executing program 5: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x82, 0x0, 0x20000dd, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0}) lsetxattr(0x0, 0x0, &(0x7f00000002c0)='ext4\x00', 0x5, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) sendto$unix(r0, &(0x7f0000000080)="a6bca8894abb4ae5bf8bfd282e1c1ef3", 0x10, 0x200000c0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 14:50:53 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = inotify_init1(0x0) fcntl$setstatus(r5, 0x4, 0x72109c5fef5d34d3) r6 = gettid() fcntl$setownex(r5, 0xf, &(0x7f0000000000)={0x0, r6}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=r6, @ANYRES64=r1], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r4}}, 0x20}}, 0x0) 14:50:53 executing program 2: sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="cf3d052d103c1bc41d91f55c36e46c72e7e961efdf99df7275f9", 0x1a}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000014000000040000080000000000000006d5ebe5a0000ffff53ef", 0xfe28, 0x400}], 0x4801, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@tipc, &(0x7f00000001c0)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa000295c) fcntl$notify(r1, 0xa, 0x34) r3 = inotify_init1(0x0) fcntl$setstatus(r3, 0x4, 0x72109c5fef5d34d3) r4 = gettid() fcntl$setownex(r3, 0xf, &(0x7f0000000000)={0x0, r4}) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa000295c) fcntl$notify(r3, 0xa, 0x34) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x48f017fc}, 0x4) 14:50:53 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 234.304541][ T27] audit: type=1804 audit(1585061453.552:35): pid=8979 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir842529212/syzkaller.lrVRdM/11/file0" dev="sda1" ino=16585 res=1 [ 234.327577][ T8985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 234.334726][ T27] audit: type=1804 audit(1585061453.552:36): pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/3/file0" dev="sda1" ino=16597 res=1 [ 234.344552][ T8981] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 234.367688][ T8985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 234.378488][ T8981] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 234.397064][ T8982] EXT4-fs (loop2): unsupported inode size: 63861 [ 234.405321][ T8981] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 234.405822][ T8979] EXT4-fs (loop5): Unrecognized mount option "ext4" or missing value [ 234.418562][ T8981] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 234.421103][ T8982] EXT4-fs (loop2): blocksize: 2048 14:50:53 executing program 1: syz_emit_ethernet(0xae, &(0x7f0000000000)=ANY=[@ANYBLOB="ffff00783afffe8003100000000000000d0000a5f3b9970000aaff02000000000000000000000000000186009078000000000000000000000000190ba78ce540cd4f791153d5dea6b259fe8000000068f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a819020001000000000000000000000000a4ba95416b2ea72dad93870fe5ef49a98309316e173974adf8e80ea9698773e8ab2bd01a5427b5856bf5044bfa749d98eeaa373e2e4f49673c219e12bffdc79fa3ef95ac54ce1d60bf7e5b67f5243b9848f7579ccb78373275f0add376a7c1a80b6aec45d8c24e4dd0de8f026e8f93345b173249a22f1649fc80d6cc5fa69dac50808ed0000000000000000000bd3b93d41ca4eaf9d48f2b749a4862a32b83dba0d3e9893b681c36b75391e2c4923f4d409c6ae44082ed3f93288d276d1fbf8fe5605af2533accf8"], 0x0) [ 234.451499][ T27] audit: type=1804 audit(1585061453.702:37): pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/3/file0" dev="sda1" ino=16597 res=1 [ 234.458292][ T8979] EXT4-fs (loop5): failed to parse options in superblock: ext4 [ 234.512544][ T8979] EXT4-fs (loop5): invalid inodes per group: 16384 [ 234.512544][ T8979] 14:50:53 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 234.565423][ T27] audit: type=1804 audit(1585061453.812:38): pid=8979 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir842529212/syzkaller.lrVRdM/11/file0" dev="sda1" ino=16585 res=1 14:50:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x400, 0x70bd28, 0x25dfdbfd}, 0x14}}, 0x20040800) unshare(0x40000000) 14:50:53 executing program 1: mlockall(0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80400, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000280)={0xd, "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"}) accept4$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xa0000, 0x4) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @loopback}}}, 0x84) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000240)=r3, 0x4) r5 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r4, r5) write$eventfd(r4, &(0x7f0000000100), 0x8) 14:50:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r4) r5 = getpid() sendmsg$unix(r2, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) getgroups(0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, r4, r6, r7, 0xee01]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_elf64(r10, 0x0, 0x0) listen(r0, 0x6) connect$inet(r10, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:50:54 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="0000a905000000b4c1357fcd98b48c7f51b1324d85b9905c017b08b8093770f41a9020160e000000000008000000000000b6d097a3a484066c29bebdb53547d4b806ac504f39e6444deeff000da4a6f63330d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a9f6960a664fa315e30f5fb560a098e015c0a44bf736717e374e8ae1342269fabe3425f306968e7227c7fa9e20b625da6152bd35831147004d4ae86b8669a0f0ac4757e1f0caed9d957e8e8c11b7aafc1a2070686e5a3a5a9be4ed35ff8de7e31c95a30e960920689d19819b102e3354738966a5417bb959c0e0e5d1f6ecb37f932a81b9cfaec52b92eaad3ee35a6d6c2e45ef7713d1a56e8881eef8c48bc90900af9464e806034ddf4be1de714ffacb0000000000000000000003355134ea28ff2ac764ef7b309a066d3acd3d7301087a30d19375783b34a36679358066e54da23651a350754cb210c721149eb4f6935"], 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:54 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 234.922907][ T9017] IPVS: ftp: loaded support on port[0] = 21 14:50:54 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:54 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 235.186461][ T27] audit: type=1804 audit(1585061454.432:39): pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/5/file0" dev="sda1" ino=16608 res=1 [ 235.295902][ T9017] IPVS: ftp: loaded support on port[0] = 21 [ 235.362834][ T27] audit: type=1804 audit(1585061454.442:40): pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/5/file0" dev="sda1" ino=16608 res=1 [ 235.504161][ T27] audit: type=1804 audit(1585061454.742:41): pid=9048 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/5/file0" dev="sda1" ino=16608 res=1 [ 235.564555][ T27] audit: type=1804 audit(1585061454.752:42): pid=9048 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/5/file0" dev="sda1" ino=16608 res=1 14:50:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = inotify_init1(0x0) fcntl$setstatus(r5, 0x4, 0x72109c5fef5d34d3) r6 = gettid() fcntl$setownex(r5, 0xf, &(0x7f0000000000)={0x0, r6}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=r6, @ANYRES64=r1], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r4}}, 0x20}}, 0x0) 14:50:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10000007f, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x338, 0x0) 14:50:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r2, r3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r4, r5) statx(r5, &(0x7f0000000040)='./file0\x00', 0x800, 0x80, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r9) r10 = getpid() sendmsg$unix(r7, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, r9}}}], 0x20}, 0x0) write$FUSE_ATTR(r3, &(0x7f0000000140)={0x78, 0x0, 0x7, {0xb5b, 0x4ad, 0x0, {0x6, 0x69f, 0xa4, 0x2, 0x0, 0x1, 0x2e4ead3a, 0x10000, 0x7fff, 0x1, 0x8, r6, r9, 0xffffff01, 0x1}}}, 0x78) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x45a140, 0x0) ioctl$KVM_SET_FPU(r11, 0x41a0ae8d, &(0x7f0000000400)={[], 0x68, 0x8, 0x77, 0x0, 0xd229, 0x0, 0x1000, [], 0xfff}) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)={[{@fat=@quiet='quiet'}]}) 14:50:54 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="0000a905000000b4c1357fcd98b48c7f51b1324d85b9905c017b08b8093770f41a9020160e000000000008000000000000b6d097a3a484066c29bebdb53547d4b806ac504f39e6444deeff000da4a6f63330d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a9f6960a664fa315e30f5fb560a098e015c0a44bf736717e374e8ae1342269fabe3425f306968e7227c7fa9e20b625da6152bd35831147004d4ae86b8669a0f0ac4757e1f0caed9d957e8e8c11b7aafc1a2070686e5a3a5a9be4ed35ff8de7e31c95a30e960920689d19819b102e3354738966a5417bb959c0e0e5d1f6ecb37f932a81b9cfaec52b92eaad3ee35a6d6c2e45ef7713d1a56e8881eef8c48bc90900af9464e806034ddf4be1de714ffacb0000000000000000000003355134ea28ff2ac764ef7b309a066d3acd3d7301087a30d19375783b34a36679358066e54da23651a350754cb210c721149eb4f6935"], 0x8) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:54 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [], 0x3}) 14:50:54 executing program 1: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 235.703335][ T9060] tmpfs: Unknown parameter '' 14:50:55 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r5 = inotify_init1(0x0) fcntl$setstatus(r5, 0x4, 0x72109c5fef5d34d3) r6 = gettid() fcntl$setownex(r5, 0xf, &(0x7f0000000000)={0x0, r6}) inotify_add_watch(r5, &(0x7f0000ac5000)='./file0\x00', 0xa000295c) fcntl$notify(r5, 0xa, 0x34) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r8 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r7, r8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r7, 0xc0505510, &(0x7f0000000240)={0x7f, 0x1, 0xe7d, 0xd4, &(0x7f0000000200)=[{}]}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0x401, 0x4, 0x4, 0x1000000, 0x80000001, {r3, r4/1000+10000}, {0x4, 0x0, 0x5, 0x1, 0x5, 0x4, "183482fe"}, 0x7, 0x1, @offset=0x6, 0x8, 0x0, r5}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r9, 0x800443d2, &(0x7f0000000180)={0xccccccccccccd7d}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x1, 0xffffffff}) 14:50:55 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [], 0x3}) [ 235.992838][ T9088] tmpfs: Unknown parameter '' 14:50:55 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [], 0x3}) [ 236.094586][ T9094] tmpfs: Unknown parameter '' 14:50:55 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:55 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) r3 = dup(0xffffffffffffffff) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = creat(&(0x7f0000000240)='./file0\x00', 0xf) open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r7 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r6, r7) dup2(r3, 0xffffffffffffffff) getsockname$tipc(r5, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e21, @loopback}], 0x10) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 236.321956][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 236.321966][ T27] audit: type=1804 audit(1585061455.572:49): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.401583][ T27] audit: type=1804 audit(1585061455.572:50): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.487466][ T27] audit: type=1804 audit(1585061455.572:51): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.550771][ T27] audit: type=1804 audit(1585061455.802:52): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.615138][ T27] audit: type=1804 audit(1585061455.802:53): pid=9110 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.668639][ T27] audit: type=1804 audit(1585061455.802:54): pid=9110 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 [ 236.717879][ T27] audit: type=1804 audit(1585061455.822:55): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/7/file0" dev="sda1" ino=16602 res=1 14:50:56 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x541000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000000000000000000d4d44feb54e30b04d117d833977e9fa1bf05fc79e80103ece9ac37a7312b1d6902a14c0ff55d3bd3eb9e175d4ecbf40a896ae6302d49cf48086437057f73010000000000000085f20aaedcb951a2c05c24759152169e5faa863a3067766561b0512fcf81c3b382b24e8db123007241ca99f4ea7be8cc8f86d9387489f607244c281c4e94fa6fca415a26500ce6601665bb5e54b8542723a7b4ef10349aef62fa2061a7da8f9bec8b4bc9b9247993f1e19ee67dbd114ba9693d105fd9bc6ec3bb22c97dea040bdbb31f6838cb2c12ca2c"]) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2a11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xff16) ioctl$FBIOBLANK(r2, 0x4611, 0x1) connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000240)=0x79, 0xfe37) writev(0xffffffffffffffff, &(0x7f0000001380), 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'ip6_vti0\x00', 0x400}) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x60) mkdirat(r4, &(0x7f0000000980)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r4, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r5, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 14:50:56 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ocfs2\x00', 0x0, 0x0) 14:50:56 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:56 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:56 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x12, r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) r3 = dup(0xffffffffffffffff) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = creat(&(0x7f0000000240)='./file0\x00', 0xf) open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r7 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r6, r7) dup2(r3, 0xffffffffffffffff) getsockname$tipc(r5, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e21, @loopback}], 0x10) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 14:50:56 executing program 2: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 237.235545][ T9123] FAULT_INJECTION: forcing a failure. [ 237.235545][ T9123] name failslab, interval 1, probability 0, space 0, times 1 [ 237.288659][ T27] audit: type=1804 audit(1585061456.542:56): pid=9124 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/8/file0" dev="sda1" ino=16626 res=1 [ 237.300918][ T9123] CPU: 1 PID: 9123 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 237.320689][ T9123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.330735][ T9123] Call Trace: [ 237.334168][ T9123] dump_stack+0x1e9/0x30e [ 237.338547][ T9123] should_fail+0x433/0x5b0 [ 237.343018][ T9123] ? __se_sys_memfd_create+0xfb/0x480 [ 237.348399][ T9123] should_failslab+0x5/0x20 [ 237.353297][ T9123] __kmalloc+0x74/0x330 [ 237.357456][ T9123] ? strnlen_user+0x206/0x2c0 [ 237.362117][ T9123] __se_sys_memfd_create+0xfb/0x480 [ 237.367320][ T9123] do_syscall_64+0xf3/0x1b0 [ 237.371860][ T9123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.377734][ T9123] RIP: 0033:0x45c849 [ 237.381612][ T9123] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.401197][ T9123] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 237.409585][ T9123] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 [ 237.417536][ T9123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 237.425484][ T9123] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 14:50:56 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 237.433435][ T9123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 237.441387][ T9123] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000000 [ 237.458023][ T27] audit: type=1804 audit(1585061456.552:57): pid=9124 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/8/file0" dev="sda1" ino=16626 res=1 14:50:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x42eef, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="68000000100005070000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="601fd3f16851e0279a5e1b53122dc4f518c243ea25d1747ccc8a4354d0e9851b1b0e522d7c812efa5dfa3305b8fe923173001ccba60cfed045f98809642dc84a8f5cdddde19795cea91a08d9fd5c6f4c3f793776420a27fa5d675a972ee5dc4248ae6c82c84a73769c8ff333d82f58ba58d55db815e9f024d0e8ee7c51a5792f81e4aa39d347be9c0589c37d25f00de69004e4c4ab37cf4c889eb2bc71500ff58d4f4ca3aa0d1e40964a2507d2d99fb8ff3fd9a2c0e6"], 0x68}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000240)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'lo\x00'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100726bd7000fbdbdf2501000000000000000741000000140018000000e0658462619624fbda8bdc75dd7a982df40d5fa5787fc69ca76663a18d4dc02bde10ee6857bc1d23f77aac98097a4d550372c1db7778cef06924731a8b163a9df83d29b9e659ba42120c189cdae634c61442faa177e6d34aa4db743971bbdb4e478d5034e056aaf143d744d2fa2d4125714aeb31260e742106e8427d9f906c636666b18edc217c38ca43516c42997e8746a5f22f8a24cb20b5df9579de9fbea9265d422d9bdc1360ab31d6cdb36b4d7d5c3b12e3e805160bfe75b670eac8fbf29b74fce4a770113aad"], 0x30}, 0x1, 0x0, 0x0, 0x20000001}, 0x4008040) [ 237.481475][ T27] audit: type=1804 audit(1585061456.702:58): pid=9124 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir049149419/syzkaller.FBw6hH/8/file0" dev="sda1" ino=16626 res=1 14:50:56 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:56 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 237.681329][ T9145] FAULT_INJECTION: forcing a failure. [ 237.681329][ T9145] name failslab, interval 1, probability 0, space 0, times 0 [ 237.727060][ T9146] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 14:50:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="696f743d6e6f6e652c756d61736b3d3078303030303030303030303030303830302c0000000000000086b31264c6145f0048f03badcdb924854a27b2748f991ac7ebd5400bd6947afcb45a7ae24d4c93917e6071e8e68eeba10c3857dca67a4c6ce1d606d7747ca12fe276ea3eed41d851a6116c4c531e8741504f8402c433398816c745fe3d1d5b51fcb3d70501cb06e5d8d7798c1300ae270a1af67ef0e00619017f9daad7a1ae7b2c5620b6c423515de6aaaecaffe13d5e3e1f8ab080c1d6e2199c"]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x4, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x6d, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0xfe42) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r3, 0x4, 0x20}, 0xc) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0xb, 0x4}) [ 237.793883][ T9145] CPU: 0 PID: 9145 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 237.802500][ T9145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.812553][ T9145] Call Trace: [ 237.815856][ T9145] dump_stack+0x1e9/0x30e [ 237.820200][ T9145] should_fail+0x433/0x5b0 [ 237.824741][ T9145] ? shmem_alloc_inode+0x17/0x40 [ 237.829680][ T9145] should_failslab+0x5/0x20 [ 237.834183][ T9145] kmem_cache_alloc+0x53/0x2d0 [ 237.838979][ T9145] ? shmem_match+0x150/0x150 [ 237.843582][ T9145] shmem_alloc_inode+0x17/0x40 [ 237.848347][ T9145] ? shmem_match+0x150/0x150 [ 237.853001][ T9145] new_inode_pseudo+0x64/0x240 [ 237.857771][ T9145] new_inode+0x25/0x1d0 [ 237.861940][ T9145] shmem_get_inode+0x10e/0x6f0 [ 237.866703][ T9145] ? __alloc_fd+0x566/0x600 [ 237.871211][ T9145] __shmem_file_setup+0x11e/0x270 [ 237.876241][ T9145] __se_sys_memfd_create+0x25e/0x480 [ 237.881535][ T9145] do_syscall_64+0xf3/0x1b0 [ 237.886052][ T9145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.891938][ T9145] RIP: 0033:0x45c849 [ 237.895827][ T9145] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.915426][ T9145] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 237.923839][ T9145] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 [ 237.931805][ T9145] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 237.939775][ T9145] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 237.947846][ T9145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 237.955812][ T9145] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000001 14:50:57 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:57 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000072000162010000000000000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 238.032295][ T9153] tipc: Enabling not permitted [ 238.041710][ T9153] tipc: Enabling of bearer rejected, failed to enable media [ 238.060394][ T9154] jfs: Unrecognized mount option "iot=none" or missing value [ 238.133024][ T9166] FAULT_INJECTION: forcing a failure. [ 238.133024][ T9166] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 238.146359][ T9166] CPU: 0 PID: 9166 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 238.153687][ T9168] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.1'. [ 238.154920][ T9166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.154925][ T9166] Call Trace: [ 238.154943][ T9166] dump_stack+0x1e9/0x30e 14:50:57 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x40) clone(0x24002583, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff, 0x80}, 0xc) mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=tcp,port=0']) [ 238.154964][ T9166] should_fail+0x433/0x5b0 [ 238.155058][ T9166] prepare_alloc_pages+0x28c/0x4a0 [ 238.191379][ T9166] __alloc_pages_nodemask+0xbf/0x600 [ 238.196686][ T9166] kmem_getpages+0x49/0x930 [ 238.201197][ T9166] cache_grow_begin+0x7b/0x2e0 [ 238.205956][ T9166] cache_alloc_refill+0x346/0x3e0 [ 238.211004][ T9166] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 238.216740][ T9166] ? check_preemption_disabled+0xb0/0x240 [ 238.222438][ T9166] ? debug_smp_processor_id+0x5/0x20 [ 238.227702][ T9166] ? shmem_alloc_inode+0x17/0x40 [ 238.232621][ T9166] kmem_cache_alloc+0x2b5/0x2d0 [ 238.237461][ T9166] ? shmem_match+0x150/0x150 [ 238.242031][ T9166] shmem_alloc_inode+0x17/0x40 [ 238.246778][ T9166] ? shmem_match+0x150/0x150 [ 238.251357][ T9166] new_inode_pseudo+0x64/0x240 [ 238.256109][ T9166] new_inode+0x25/0x1d0 [ 238.260256][ T9166] shmem_get_inode+0x10e/0x6f0 [ 238.264998][ T9166] ? __alloc_fd+0x566/0x600 [ 238.269481][ T9166] __shmem_file_setup+0x11e/0x270 [ 238.274539][ T9166] __se_sys_memfd_create+0x25e/0x480 [ 238.279830][ T9166] do_syscall_64+0xf3/0x1b0 [ 238.284313][ T9166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.290181][ T9166] RIP: 0033:0x45c849 [ 238.294054][ T9166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.313640][ T9166] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 238.322034][ T9166] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 14:50:57 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 238.330119][ T9166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 238.338071][ T9166] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 238.346036][ T9166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 238.353984][ T9166] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000002 [ 238.374978][ T9153] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 14:50:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa000295c) fcntl$notify(r1, 0xa, 0x34) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="0f34", 0x2}, {&(0x7f0000000140)="9769850348fc4b1509289345cfaa071d4d341f7e2491a0fb41ddccaf4dce2430075ce0cc608d945996853b9cd381ec1497663b9d56d60bd2e7", 0x39}, {&(0x7f0000000200)="da12535b7e68cb1e537fae6693a7ba73223658692ad47c7b0a965a8bf98da3feb58d2f3007d8053e4bb759734e05b200806e67427a2ab333a19f3e2838364f3d810c2bc329e2be80d4501f68d433157b62eb3b0983dc75c3bfc42557e87a718f2aa2c338c8f1713507db5d8b7cc66adc5fb621bc671472bfa57d8c2d27e320bf60bc22624cea007d85df617d3045d13346250fc6ac64014db9684517d95f1939c1dd79a133f815e749528840122faf7bdf74a1de18935d2fe9d53bd12d4711a1ae967eb0635d668e9677c711d96c214bb1575600a1aa72f118afb1ed250ab11c349120b107b5d115e24e780d4e2ce04d4c6e94", 0xf3}], 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={@loopback, 0x37}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x2000000000010, &(0x7f0000000000)="3e4ecd911ab8a5c97fa7efd908a2c0eec3ae866a3f8481cb87e84391dc2189a3b5ecdc2e9e5ffbd1652ef16444d61b9037944fb32902a7") ptrace$cont(0x7, r0, 0x0, 0x0) [ 238.492027][ T9154] jfs: Unrecognized mount option "iot=none" or missing value [ 238.517706][ T9166] tmpfs: Bad value for 'mpol' 14:50:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 238.547084][ T9183] 9pnet: p9_fd_create_tcp (9183): problem connecting socket to 127.0.0.1 [ 238.550741][ T9187] 9pnet: p9_fd_create_tcp (9187): problem connecting socket to 127.0.0.1 14:50:57 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 238.726024][ T9203] FAULT_INJECTION: forcing a failure. [ 238.726024][ T9203] name failslab, interval 1, probability 0, space 0, times 0 [ 238.800870][ T9203] CPU: 0 PID: 9203 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 238.809491][ T9203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.819548][ T9203] Call Trace: [ 238.822844][ T9203] dump_stack+0x1e9/0x30e [ 238.827183][ T9203] should_fail+0x433/0x5b0 [ 238.831677][ T9203] ? __d_alloc+0x2a/0x6d0 [ 238.836006][ T9203] should_failslab+0x5/0x20 [ 238.840518][ T9203] kmem_cache_alloc+0x53/0x2d0 [ 238.845337][ T9203] ? read_seqcount_begin+0x177/0x1c0 [ 238.850635][ T9203] __d_alloc+0x2a/0x6d0 [ 238.854864][ T9203] ? lockdep_init_map+0x26/0x670 [ 238.859808][ T9203] d_alloc_pseudo+0x19/0x70 [ 238.864360][ T9203] alloc_file_pseudo+0xc8/0x240 [ 238.869231][ T9203] __shmem_file_setup+0x194/0x270 [ 238.874264][ T9203] __se_sys_memfd_create+0x25e/0x480 [ 238.879558][ T9203] do_syscall_64+0xf3/0x1b0 [ 238.884069][ T9203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.889954][ T9203] RIP: 0033:0x45c849 [ 238.893839][ T9203] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.913434][ T9203] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 238.921841][ T9203] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 [ 238.929823][ T9203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 238.937792][ T9203] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 14:50:58 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:50:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r3, r4) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x5c, 0x453, 0x2, 0x70bd2d, 0x25dfdbfc, "e2fb1a9b267b55b63b195a3d00091680819038092f60401bef30761a527da8f242c3bcc28da52381896723dd9f3e22fbb1a19a8f4a953f57d05350537e08e33cfb4bcf3205bba65d4fabc4", ["", ""]}, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0x44000) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5800000010000104000004000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002800128009000100766c61334dc3c6b9306e000000001840028006000100000000000c0002001f0000001900000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x58}}, 0x0) 14:50:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000cab000)=0xc) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000000c0)=0x1, 0x4) r3 = inotify_init1(0x0) fcntl$setstatus(r3, 0x4, 0x72109c5fef5d34d3) r4 = gettid() fcntl$setownex(r3, 0xf, &(0x7f0000000000)={0x0, r4}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000740)=ANY=[]) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r5, r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x6d, &(0x7f0000000080), &(0x7f00000000c0)=0xfe42) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x9, 0x30, 0x0, 0x1}, &(0x7f0000000140)=0x18) 14:50:58 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 14:50:58 executing program 1: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) close(r2) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 238.945750][ T9203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 238.953694][ T9203] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000003 14:50:58 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 239.007356][ T9218] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 239.025753][ T9218] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:50:58 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 239.106214][ T9235] FAULT_INJECTION: forcing a failure. [ 239.106214][ T9235] name failslab, interval 1, probability 0, space 0, times 0 [ 239.140990][ T9235] CPU: 0 PID: 9235 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 239.149613][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.159660][ T9235] Call Trace: [ 239.162953][ T9235] dump_stack+0x1e9/0x30e [ 239.167296][ T9235] should_fail+0x433/0x5b0 [ 239.171721][ T9235] ? __alloc_file+0x26/0x380 [ 239.176307][ T9235] should_failslab+0x5/0x20 [ 239.180815][ T9235] kmem_cache_alloc+0x53/0x2d0 [ 239.185588][ T9235] __alloc_file+0x26/0x380 [ 239.190005][ T9235] ? alloc_empty_file+0x47/0x1b0 [ 239.194945][ T9235] alloc_empty_file+0xa7/0x1b0 [ 239.199709][ T9235] alloc_file+0x5d/0x4b0 14:50:58 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x20080) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000090000000300000090020000c80000000000000000000000c800000000000000c0010000c0010000c0010000c0010000c001000003000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800c80000000000000000000000000000000000000000000000000020004e4f545241434b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000b0000000000000028004e4651554555450000000000000000000000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2f0) dup2(r0, r1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r3, r4) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x1, 0x2, 0x4, 0x200000, 0x9, {0x77359400}, {0x3, 0x1, 0x9, 0x0, 0x7f, 0x7, "7219d511"}, 0x8225, 0x4, @fd=r3, 0x2, 0x0, 0xffffffffffffffff}) bind$l2tp6(r5, &(0x7f0000000000)={0xa, 0x0, 0x4, @loopback, 0xff, 0x1}, 0x20) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000040)={0x7ff, 0x0, 0x3, 0xffffffe1}, 0x10) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="13000000420007031dfffd946f61050007000d", 0x13}], 0x1}, 0x0) 14:50:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 239.203960][ T9235] alloc_file_pseudo+0x1b0/0x240 [ 239.208913][ T9235] __shmem_file_setup+0x194/0x270 [ 239.213946][ T9235] __se_sys_memfd_create+0x25e/0x480 [ 239.219288][ T9235] do_syscall_64+0xf3/0x1b0 [ 239.223800][ T9235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.229684][ T9235] RIP: 0033:0x45c849 [ 239.233574][ T9235] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.253166][ T9235] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 239.261554][ T9235] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 [ 239.269507][ T9235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 239.277472][ T9235] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 239.285429][ T9235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 239.293378][ T9235] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000004 14:50:58 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 239.545493][ T9244] FAULT_INJECTION: forcing a failure. [ 239.545493][ T9244] name failslab, interval 1, probability 0, space 0, times 0 [ 239.563479][ T9244] CPU: 0 PID: 9244 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 239.572088][ T9244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.582142][ T9244] Call Trace: [ 239.585428][ T9244] dump_stack+0x1e9/0x30e [ 239.589757][ T9244] should_fail+0x433/0x5b0 [ 239.594157][ T9244] ? __alloc_file+0x26/0x380 [ 239.598724][ T9244] should_failslab+0x5/0x20 [ 239.603205][ T9244] kmem_cache_alloc+0x53/0x2d0 [ 239.607961][ T9244] __alloc_file+0x26/0x380 [ 239.612369][ T9244] ? alloc_empty_file+0x47/0x1b0 [ 239.617294][ T9244] alloc_empty_file+0xa7/0x1b0 [ 239.622034][ T9244] alloc_file+0x5d/0x4b0 [ 239.626257][ T9244] alloc_file_pseudo+0x1b0/0x240 [ 239.631177][ T9244] __shmem_file_setup+0x194/0x270 [ 239.636183][ T9244] __se_sys_memfd_create+0x25e/0x480 [ 239.641577][ T9244] do_syscall_64+0xf3/0x1b0 [ 239.646059][ T9244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.651926][ T9244] RIP: 0033:0x45c849 [ 239.655810][ T9244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.675447][ T9244] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 239.683841][ T9244] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c849 14:50:59 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 239.691788][ T9244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 239.699739][ T9244] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 239.707686][ T9244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 239.715691][ T9244] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000005 14:50:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='\x80', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r2, r3) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x80}]}) sendfile(r0, r1, 0x0, 0x102002700) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008080) [ 239.903551][ T9263] FAULT_INJECTION: forcing a failure. [ 239.903551][ T9263] name failslab, interval 1, probability 0, space 0, times 0 [ 239.916496][ T9263] CPU: 0 PID: 9263 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 239.925071][ T9263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.935115][ T9263] Call Trace: [ 239.938416][ T9263] dump_stack+0x1e9/0x30e [ 239.942759][ T9263] should_fail+0x433/0x5b0 [ 239.947291][ T9263] ? tomoyo_realpath_from_path+0xd8/0x630 [ 239.953008][ T9263] should_failslab+0x5/0x20 [ 239.957512][ T9263] __kmalloc+0x74/0x330 [ 239.961671][ T9263] ? tomoyo_realpath_from_path+0xcb/0x630 [ 239.967392][ T9263] tomoyo_realpath_from_path+0xd8/0x630 [ 239.972957][ T9263] ? rcu_lock_acquire+0x5/0x30 [ 239.977736][ T9263] tomoyo_path_perm+0x17d/0x740 [ 239.982691][ T9263] security_path_truncate+0xc0/0x140 [ 239.987979][ T9263] do_sys_ftruncate+0x43a/0x680 [ 239.992828][ T9263] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 239.998532][ T9263] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 240.004587][ T9263] do_syscall_64+0xf3/0x1b0 [ 240.009076][ T9263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.014943][ T9263] RIP: 0033:0x45c817 [ 240.018819][ T9263] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.038399][ T9263] RSP: 002b:00007f356a154a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 240.046786][ T9263] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c817 [ 240.054743][ T9263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 240.062696][ T9263] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 240.070654][ T9263] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 240.078609][ T9263] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000006 14:50:59 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:50:59 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) write$capi20_data(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="fffffffffffffffb0100008000000000da005d2b4e8e006267ac723223a0f530e75a03fe2527dee56f5d097c99ae24384710d46eb0612c111b673610dd6504a7fe7a9a5e902649bcacc0d943b54888dc5ba76b9e2750f88aea513c343efdf650af86db08ca9e76b50878d7ea7cbf49175918ee291c77f133caecf640b5bff9492b5e6867890694810e1ac4e4e92a9fb5078fdc55b40d6a19dac0a59b9858f6425c9e5f16aaf0056edebd373eddc902bf6e060b09cb62c3a31f1d25f56de824d09c8bf3f0cb718660f8e83bff666ea87f"], 0xec) syz_read_part_table(0x8, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="97b395b35de69f195bd634f8654f24e4baaebd9c3ba57d9a1977f5695622d599f2e9c3fb04d26c4a4c0f62f3f42f71d23d38575fc6af343a9368f121621a03207665916cb8f4fcc6d01c09eb90ab0ea55b7d6b00249d2717290b1cc711d7682dcdfa6476390b8a2115247587746382e671986d576fcc4542b2048c0e", 0x7c, 0x5}]) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="6a4be8ab18787e36bbbd2e8c60b3e199", 0x3}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000100)=0x400, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = dup(r0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="100027bd7000fedbdf25210000000400ec00080077000900000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x8010}, 0x24004001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000040)=0x1ff) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x1}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4001, &(0x7f00000001c0)=0x7, 0x9, 0x3) sendmmsg(r2, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)="d43bb4185658b15e90ad7ceed2ae05e0729484a3898e62c1dccca657492a64eed3f663b94d04e94ee6bafb67aea02807", 0x30}, {&(0x7f0000000380)="824bd31c4fa03743b2ab1311eb27fba318c212ec77042663c85708f63db6f63d788abbf9d3ac2997d48528111c307660c28e3f8954774d861ae795d54d5d50daa1785901169848ea8b47b46e", 0x4c}, {&(0x7f0000000400)="e664402718d98de9fc765a685f7048196abf9fec293f4ccd7183e39abf431ddd15608216d76b593fe6e95f2b4609ad6d88f23f38f63d1abb7d5e345f0694ba4263900daaf6a6e6d86acd983ba86df6dea7aaf46a9609a079706ceb3f2441a274b7fb34a9a5f6fef958ec5e46fb27de26ace8384c0b112427a8adcf49307f88b59ce9a9f442f408b32d947cc0d89865f2c8748dda7e13b2d6dc55d9deeebd4e02", 0xa0}, {&(0x7f0000003340)="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", 0x1c9}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x2c, 0x24004000) ftruncate(0xffffffffffffffff, 0x100000001) 14:50:59 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) [ 240.101314][ T9263] ERROR: Out of memory at tomoyo_realpath_from_path. 14:50:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 240.189220][ T9263] tmpfs: Bad value for 'mpol' 14:50:59 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:50:59 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 240.589139][ T9298] FAULT_INJECTION: forcing a failure. [ 240.589139][ T9298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 240.602742][ T9298] CPU: 0 PID: 9298 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 240.602757][ T9298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.602762][ T9298] Call Trace: [ 240.602781][ T9298] dump_stack+0x1e9/0x30e [ 240.602803][ T9298] should_fail+0x433/0x5b0 14:50:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:00 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:00 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 240.602828][ T9298] prepare_alloc_pages+0x28c/0x4a0 [ 240.602848][ T9298] __alloc_pages_nodemask+0xbf/0x600 [ 240.602878][ T9298] kmem_getpages+0x49/0x930 [ 240.602896][ T9298] cache_grow_begin+0x7b/0x2e0 14:51:00 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 240.602914][ T9298] cache_alloc_refill+0x346/0x3e0 [ 240.602926][ T9298] ? trace_irq_disable_rcuidle+0x1f/0x1d0 14:51:00 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 240.602936][ T9298] ? check_preemption_disabled+0xb0/0x240 [ 240.602944][ T9298] ? debug_smp_processor_id+0x5/0x20 14:51:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 240.602960][ T9298] __kmalloc+0x30c/0x330 [ 240.602974][ T9298] ? tomoyo_realpath_from_path+0xd8/0x630 14:51:00 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 240.602989][ T9298] tomoyo_realpath_from_path+0xd8/0x630 [ 240.602998][ T9298] ? rcu_lock_acquire+0x5/0x30 [ 240.603024][ T9298] tomoyo_path_perm+0x17d/0x740 [ 240.603086][ T9298] security_path_truncate+0xc0/0x140 [ 240.603101][ T9298] do_sys_ftruncate+0x43a/0x680 [ 240.603120][ T9298] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 240.603132][ T9298] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 240.603156][ T9298] do_syscall_64+0xf3/0x1b0 [ 240.603173][ T9298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.603183][ T9298] RIP: 0033:0x45c817 [ 240.603193][ T9298] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.603200][ T9298] RSP: 002b:00007f356a154a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 240.603210][ T9298] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c817 [ 240.603216][ T9298] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 240.603222][ T9298] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 240.603228][ T9298] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 240.603234][ T9298] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000007 [ 240.702892][ T9298] tmpfs: Bad value for 'mpol' [ 240.934923][ T9321] FAULT_INJECTION: forcing a failure. [ 240.934923][ T9321] name failslab, interval 1, probability 0, space 0, times 0 [ 240.934936][ T9321] CPU: 1 PID: 9321 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 240.934943][ T9321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.934947][ T9321] Call Trace: [ 240.934965][ T9321] dump_stack+0x1e9/0x30e [ 240.934984][ T9321] should_fail+0x433/0x5b0 [ 240.935007][ T9321] ? getname_flags+0xb8/0x610 [ 240.935016][ T9321] should_failslab+0x5/0x20 [ 240.935026][ T9321] kmem_cache_alloc+0x53/0x2d0 [ 240.935045][ T9321] getname_flags+0xb8/0x610 [ 240.935066][ T9321] do_sys_openat2+0x3f2/0x6c0 [ 240.935090][ T9321] __x64_sys_open+0x1af/0x1e0 [ 240.935112][ T9321] do_syscall_64+0xf3/0x1b0 [ 240.935129][ T9321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.935138][ T9321] RIP: 0033:0x4165e1 [ 240.935149][ T9321] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 240.935155][ T9321] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 240.935166][ T9321] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 240.935172][ T9321] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 240.935179][ T9321] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 240.935184][ T9321] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 240.935191][ T9321] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000008 [ 241.182740][ T9338] FAULT_INJECTION: forcing a failure. [ 241.182740][ T9338] name failslab, interval 1, probability 0, space 0, times 0 [ 241.182755][ T9338] CPU: 0 PID: 9338 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 241.182762][ T9338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.182767][ T9338] Call Trace: [ 241.182784][ T9338] dump_stack+0x1e9/0x30e [ 241.182803][ T9338] should_fail+0x433/0x5b0 [ 241.182835][ T9338] ? getname_flags+0xb8/0x610 [ 241.182845][ T9338] should_failslab+0x5/0x20 [ 241.182856][ T9338] kmem_cache_alloc+0x53/0x2d0 [ 241.182874][ T9338] getname_flags+0xb8/0x610 [ 241.182895][ T9338] do_sys_openat2+0x3f2/0x6c0 [ 241.182919][ T9338] __x64_sys_open+0x1af/0x1e0 [ 241.182947][ T9338] do_syscall_64+0xf3/0x1b0 [ 241.182964][ T9338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.182973][ T9338] RIP: 0033:0x4165e1 [ 241.182983][ T9338] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 241.182989][ T9338] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:51:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4, 0x2}]}, @IFLA_MASTER={0x8}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4, 0x2}]}, @IFLA_MASTER={0x8}]}, 0x30}}, 0x0) recvmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f00000002c0)=@pppoe, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/24, 0x18}, {&(0x7f0000000380)=""/50, 0x32}, {&(0x7f0000000600)=""/197, 0xc5}], 0x3, &(0x7f0000000700)=""/36, 0x24}, 0x3}, {{&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/107, 0x6b}, {&(0x7f0000000840)=""/242, 0xf2}], 0x2, &(0x7f0000000980)=""/4096, 0x1000}, 0x7}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001980)=""/126, 0x7e}, {&(0x7f0000001a00)}, {&(0x7f0000001a40)=""/13, 0xd}, {&(0x7f0000001a80)=""/61, 0x3d}], 0x4, &(0x7f0000001b00)}}, {{&(0x7f0000001b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001c80)=""/190, 0xbe}, {&(0x7f0000001bc0)=""/42, 0x2a}], 0x2, &(0x7f0000001d80)=""/140, 0x8c}, 0x6}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001e40)=""/52, 0x34}], 0x1, &(0x7f0000001ec0)}, 0x2}, {{&(0x7f0000001f00)=@x25, 0x80, &(0x7f0000003300)=[{&(0x7f0000001f80)=""/171, 0xab}, {&(0x7f0000002040)=""/106, 0x6a}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/114, 0x72}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/148, 0x94}], 0x6, &(0x7f0000003380)=""/48, 0x30}, 0x5}], 0x6, 0x2021, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000003780)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003740)={&(0x7f0000003540)={0x1f4, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKMODES_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKMODES_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x40004}, 0x2400c011) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r7, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f00000000c0)={0xffffff57, 0x0, 0x0, 0x0, 0x0, {0x40}, [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$VT_SETMODE(r7, 0x5602, &(0x7f0000000080)={0x0, 0xff, 0x5, 0x7, 0x6}) r8 = socket(0x11, 0x80002, 0x0) getsockopt$packet_int(r8, 0x107, 0x9, 0x0, &(0x7f00000000c0)) 14:51:01 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) 14:51:01 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:01 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 241.182999][ T9338] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 241.183005][ T9338] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 241.183011][ T9338] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 241.183017][ T9338] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 241.183023][ T9338] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000009 [ 241.932680][ T9356] FAULT_INJECTION: forcing a failure. [ 241.932680][ T9356] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 241.945545][ T9357] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 241.945929][ T9356] CPU: 1 PID: 9356 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 241.969575][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.979620][ T9356] Call Trace: [ 241.982914][ T9356] dump_stack+0x1e9/0x30e [ 241.987247][ T9356] should_fail+0x433/0x5b0 [ 241.991675][ T9356] prepare_alloc_pages+0x28c/0x4a0 [ 241.996790][ T9356] __alloc_pages_nodemask+0xbf/0x600 [ 242.002088][ T9356] kmem_getpages+0x49/0x930 [ 242.006592][ T9356] cache_grow_begin+0x7b/0x2e0 [ 242.011358][ T9356] cache_alloc_refill+0x346/0x3e0 [ 242.016383][ T9356] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 242.022101][ T9356] ? check_preemption_disabled+0xb0/0x240 [ 242.027816][ T9356] ? debug_smp_processor_id+0x5/0x20 [ 242.033099][ T9356] ? getname_flags+0xb8/0x610 [ 242.037773][ T9356] kmem_cache_alloc+0x2b5/0x2d0 [ 242.042629][ T9356] getname_flags+0xb8/0x610 [ 242.047136][ T9356] do_sys_openat2+0x3f2/0x6c0 [ 242.051820][ T9356] __x64_sys_open+0x1af/0x1e0 [ 242.056507][ T9356] do_syscall_64+0xf3/0x1b0 [ 242.061011][ T9356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.066906][ T9356] RIP: 0033:0x4165e1 [ 242.070798][ T9356] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 242.090396][ T9356] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 242.098799][ T9356] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 242.106766][ T9356] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 242.114730][ T9356] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 242.122693][ T9356] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 14:51:01 executing program 2: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xffffffff, 0x24b, 0x3ff, 0x7be, 0x3}, 0x14) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(r1, 0x1269, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'dummy0\x00'}}, 0x1e) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000a00)={[], 0xfffc, 0x8, 0x12, 0x0, 0x9, 0x20000, 0xf000, [], 0x800}) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd1d7c3d878a09a030de999bf44b17efb60450958485aa56389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180842ece11ead980ef52b15a8ac6966c963f4b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332bc4f4d12988e620895ba7bc183d5f05fdf63e00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c9543719942612f9ffe609c9ffc94bc56acd2c91ef0d998d6e292e4433595c5ee10117d6d6853272812fc2f2abe513f138b", 0xfd}, {&(0x7f0000000100)}, {&(0x7f0000000900)="345c2d8464d48dbe1db4ec986cf95cb03f41a44dfbabe12014ed2e94adaefd4ac9ce7a66fa2ca9a0ec6aa8d43a4664839a6d491b7eb05c4fcc319d152e6c4a15faff7e62a8e70dc01dfd2cad7c4076640298660cac28e6120ee3be5d6a4bc89a84bf1f4fe1648ebb65117c71a567950eebb384cdad5a0c659f1a73c36b9cd4ec918859b1a1c3f58b8d72591bf8ca7b353101d8c0f9fb5dfde7a88c3da8f2640a035d27600aefcac52dbddc6e9ec705e6f4ea30fb154104518c7064872fbfcc5eeafb78e09c980cdafd6d6233df114d5c8d9004fb51", 0xd5}], 0x3, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r5) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0x6612, &(0x7f00000004c0)={0x0, 0x252a, 0x3f000000, 0x0, [], [{}, {0x801}]}) ioctl$FS_IOC_GETFSMAP(r7, 0x6612, &(0x7f0000000bc0)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c00000000000000000000000000000000000000000000000000000000000000ff010000000000002000000000000000070000000000000000000000000000000000000000000000000000000000000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d27500020000000000000010000000000000000000000000000000000000000000000000000000000000180000000000000011be794de8297093cf4ce034ea4a2b63fa68bddbea81be"]) dup(r6) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 242.130659][ T9356] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000a [ 242.139832][ T27] kauditd_printk_skb: 26 callbacks suppressed [ 242.139839][ T27] audit: type=1800 audit(1585061461.182:80): pid=9358 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16658 res=0 14:51:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x6, 0x563600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000001640)='.^x', 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000000340)="8a", 0x1}], 0x1, 0x800001f) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0xfffffffb, 0x0, 0x0, 0xd, "b04a8270661ee8d154c629f75b71a95af29c110359ad514d3aa20d7beebc689ab0015a1f48dc57122f1b38ede8af694c0d430000002500", "d66ee438c00fa49bebf7a08c305bee6fd600"}) 14:51:01 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 242.279446][ T9356] tmpfs: Bad value for 'mpol' [ 242.288029][ T9359] ntfs: (device loop1): parse_options(): Unrecognized mount option . 14:51:01 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) write$snddsp(r2, &(0x7f0000000100)="89b7fc3a1fbb163a49e3b1621c4e50eb154bc1e7c22577d62e33643aec3d47fba0d87e9fbd45e8b5a642fe136fea089038516ef321d5301f7dedc0cfd28f95f77d0f09625c93422a7775c03c1be06303fbaa2d8690b2acfe96730cd53731240b1ce2e5a2d73ace375660c6d064a8b95faed503985f06b4ab485fb8a54d95c0fa2982b904bb818a5a97d57e4f47b2b53f911df686d0456c2de721648427c074c003de", 0xa2) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0xffffffffffffffff) futimesat(r3, 0x0, &(0x7f0000000040)) r4 = inotify_init() r5 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x4000082) getpid() r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x40) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) sendfile(0xffffffffffffffff, r5, &(0x7f0000000080)=0x2, 0xa198) 14:51:01 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c667363616368656c6163636573733d616e792c00feffff74656e642c00"]) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000040)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000280)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000700)=@ethtool_ringparam={0x11, 0x7, 0x4, 0x9, 0x3, 0x4, 0x4, 0x5, 0x401}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'syzkaller0\x00', &(0x7f0000000700)=@ethtool_per_queue_op={0x24, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f5483e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x2000, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f577a9c2f75c1a3d34b9640d8b42b4000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004dd8b4bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000743cc903e30ba1f13ce239560c444f0a21d80f797e7e57c10b92d6f9bd50718100"/552]}) 14:51:01 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) 14:51:01 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:01 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 242.656605][ T27] audit: type=1804 audit(1585061461.902:81): pid=9389 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir842529212/syzkaller.lrVRdM/23/file0" dev="sda1" ino=16606 res=1 [ 242.681490][ T9399] FAULT_INJECTION: forcing a failure. [ 242.681490][ T9399] name failslab, interval 1, probability 0, space 0, times 0 [ 242.713678][ T9399] CPU: 0 PID: 9399 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 242.722398][ T9399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.732450][ T9399] Call Trace: [ 242.735749][ T9399] dump_stack+0x1e9/0x30e [ 242.740089][ T9399] should_fail+0x433/0x5b0 [ 242.744520][ T9399] ? __alloc_file+0x26/0x380 [ 242.746234][ T9398] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 242.749105][ T9399] should_failslab+0x5/0x20 [ 242.749117][ T9399] kmem_cache_alloc+0x53/0x2d0 [ 242.749137][ T9399] __alloc_file+0x26/0x380 [ 242.749147][ T9399] ? alloc_empty_file+0x47/0x1b0 [ 242.749162][ T9399] alloc_empty_file+0xa7/0x1b0 [ 242.749176][ T9399] path_openat+0xa4/0x40d0 [ 242.784938][ T9399] ? __kasan_kmalloc+0x183/0x1c0 [ 242.789878][ T9399] ? kmem_cache_alloc+0x1f5/0x2d0 [ 242.794902][ T9399] ? getname_flags+0xb8/0x610 [ 242.799588][ T9399] ? __lock_acquire+0xc5a/0x1bc0 [ 242.804623][ T9399] ? rcu_read_lock_sched_held+0x106/0x170 [ 242.810387][ T9399] do_filp_open+0x191/0x3a0 [ 242.814896][ T9399] ? do_raw_spin_unlock+0x134/0x8d0 [ 242.820105][ T9399] ? _raw_spin_unlock+0x24/0x40 [ 242.824957][ T9399] ? __alloc_fd+0x566/0x600 [ 242.829474][ T9399] do_sys_openat2+0x448/0x6c0 [ 242.834160][ T9399] __x64_sys_open+0x1af/0x1e0 [ 242.838853][ T9399] do_syscall_64+0xf3/0x1b0 [ 242.843365][ T9399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.849278][ T9399] RIP: 0033:0x4165e1 [ 242.853171][ T9399] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 242.872770][ T9399] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 242.881174][ T9399] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 242.889141][ T9399] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 242.897113][ T9399] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 242.905082][ T9399] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 242.913045][ T9399] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000b [ 242.933398][ T27] audit: type=1800 audit(1585061462.132:82): pid=9408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16670 res=0 14:51:02 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) 14:51:02 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c667363616368656c6163636573733d616e792c00feffff74656e642c00"]) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000040)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000280)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000700)=@ethtool_ringparam={0x11, 0x7, 0x4, 0x9, 0x3, 0x4, 0x4, 0x5, 0x401}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'syzkaller0\x00', &(0x7f0000000700)=@ethtool_per_queue_op={0x24, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f5483e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x2000, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f577a9c2f75c1a3d34b9640d8b42b4000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004dd8b4bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000743cc903e30ba1f13ce239560c444f0a21d80f797e7e57c10b92d6f9bd50718100"/552]}) [ 243.138580][ T27] audit: type=1804 audit(1585061462.262:83): pid=9389 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir842529212/syzkaller.lrVRdM/23/file0" dev="sda1" ino=16606 res=1 14:51:02 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 243.329940][ T9431] FAULT_INJECTION: forcing a failure. [ 243.329940][ T9431] name failslab, interval 1, probability 0, space 0, times 0 [ 243.350901][ T9432] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 243.369491][ T9431] CPU: 1 PID: 9431 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 243.378096][ T9431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.388155][ T9431] Call Trace: [ 243.391445][ T9431] dump_stack+0x1e9/0x30e [ 243.395788][ T9431] should_fail+0x433/0x5b0 [ 243.400218][ T9431] ? security_file_alloc+0x32/0x200 [ 243.405419][ T9431] should_failslab+0x5/0x20 [ 243.409932][ T9431] kmem_cache_alloc+0x53/0x2d0 [ 243.414694][ T9431] security_file_alloc+0x32/0x200 [ 243.419711][ T9431] __alloc_file+0xd7/0x380 [ 243.424113][ T9431] alloc_empty_file+0xa7/0x1b0 [ 243.428858][ T9431] path_openat+0xa4/0x40d0 [ 243.433253][ T9431] ? __kasan_kmalloc+0x183/0x1c0 [ 243.438168][ T9431] ? kmem_cache_alloc+0x1f5/0x2d0 [ 243.443175][ T9431] ? getname_flags+0xb8/0x610 [ 243.447832][ T9431] ? __lock_acquire+0xc5a/0x1bc0 [ 243.452762][ T9431] ? rcu_read_lock_sched_held+0x106/0x170 [ 243.458499][ T9431] do_filp_open+0x191/0x3a0 [ 243.462994][ T9431] ? do_raw_spin_unlock+0x134/0x8d0 [ 243.468192][ T9431] ? _raw_spin_unlock+0x24/0x40 [ 243.473030][ T9431] ? __alloc_fd+0x566/0x600 [ 243.477522][ T9431] do_sys_openat2+0x448/0x6c0 [ 243.482190][ T9431] __x64_sys_open+0x1af/0x1e0 [ 243.486854][ T9431] do_syscall_64+0xf3/0x1b0 [ 243.491340][ T9431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.497213][ T9431] RIP: 0033:0x4165e1 [ 243.501095][ T9431] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 243.520680][ T9431] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:51:02 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:02 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c667363616368656c6163636573733d616e792c00feffff74656e642c00"]) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000040)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000100)=0xfe, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000280)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000700)=@ethtool_ringparam={0x11, 0x7, 0x4, 0x9, 0x3, 0x4, 0x4, 0x5, 0x401}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'syzkaller0\x00', &(0x7f0000000700)=@ethtool_per_queue_op={0x24, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f5483e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x2000, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f577a9c2f75c1a3d34b9640d8b42b4000000000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004dd8b4bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000743cc903e30ba1f13ce239560c444f0a21d80f797e7e57c10b92d6f9bd50718100"/552]}) 14:51:02 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 243.529068][ T9431] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 243.537018][ T9431] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 243.544969][ T9431] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 243.552920][ T9431] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 243.560871][ T9431] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000c 14:51:02 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:02 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:02 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 243.754289][ T9454] FAULT_INJECTION: forcing a failure. [ 243.754289][ T9454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 243.767527][ T9454] CPU: 1 PID: 9454 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 243.770735][ T27] audit: type=1800 audit(1585061463.002:84): pid=9453 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16672 res=0 [ 243.776108][ T9454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.805322][ T9454] Call Trace: [ 243.808608][ T9454] dump_stack+0x1e9/0x30e [ 243.812948][ T9454] should_fail+0x433/0x5b0 [ 243.817368][ T9454] ? mark_lock+0x107/0x1650 [ 243.821876][ T9454] prepare_alloc_pages+0x28c/0x4a0 [ 243.826997][ T9454] __alloc_pages_nodemask+0xbf/0x600 [ 243.832301][ T9454] kmem_getpages+0x49/0x930 [ 243.836812][ T9454] cache_grow_begin+0x7b/0x2e0 [ 243.841577][ T9454] cache_alloc_refill+0x346/0x3e0 [ 243.846598][ T9454] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 243.852306][ T9454] ? check_preemption_disabled+0xb0/0x240 [ 243.858015][ T9454] ? debug_smp_processor_id+0x5/0x20 [ 243.863353][ T9454] __kmalloc+0x30c/0x330 [ 243.867599][ T9454] ? tomoyo_realpath_from_path+0xd8/0x630 [ 243.873321][ T9454] tomoyo_realpath_from_path+0xd8/0x630 [ 243.878859][ T9454] ? rcu_lock_acquire+0x5/0x30 [ 243.883621][ T9454] ? memset+0x1f/0x40 [ 243.887602][ T9454] tomoyo_check_open_permission+0x1b6/0x900 [ 243.893568][ T9454] security_file_open+0x50/0x2c0 [ 243.898529][ T9454] do_dentry_open+0x357/0x10a0 [ 243.903297][ T9454] path_openat+0x13b5/0x40d0 [ 243.907896][ T9454] ? __kasan_kmalloc+0x183/0x1c0 [ 243.912827][ T9454] ? __lock_acquire+0xc5a/0x1bc0 [ 243.917764][ T9454] do_filp_open+0x191/0x3a0 [ 243.922256][ T9454] ? _raw_spin_unlock+0x24/0x40 [ 243.927114][ T9454] ? __alloc_fd+0x566/0x600 [ 243.931638][ T9454] do_sys_openat2+0x448/0x6c0 [ 243.936311][ T9454] __x64_sys_open+0x1af/0x1e0 [ 243.940971][ T9454] do_syscall_64+0xf3/0x1b0 [ 243.945479][ T9454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.951401][ T9454] RIP: 0033:0x4165e1 [ 243.955268][ T9454] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 243.974862][ T9454] RSP: 002b:00007f356a154a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 243.983360][ T9454] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 00000000004165e1 [ 243.991311][ T9454] RDX: 00007f356a154b0a RSI: 0000000000000002 RDI: 00007f356a154b00 [ 243.999259][ T9454] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 244.007207][ T9454] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 244.015249][ T9454] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000d 14:51:03 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendfile(r3, r5, 0x0, 0x200fff) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:03 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 244.146399][ T9454] tmpfs: Bad value for 'mpol' 14:51:03 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:03 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 244.236786][ T27] audit: type=1800 audit(1585061463.482:85): pid=9473 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16678 res=0 14:51:03 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 244.389965][ T27] audit: type=1800 audit(1585061463.632:86): pid=9482 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16657 res=0 14:51:03 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:03 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 244.612309][ T9489] FAULT_INJECTION: forcing a failure. [ 244.612309][ T9489] name failslab, interval 1, probability 0, space 0, times 0 [ 244.650920][ T9489] CPU: 0 PID: 9489 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 14:51:03 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 244.659540][ T9489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.669586][ T9489] Call Trace: [ 244.672875][ T9489] dump_stack+0x1e9/0x30e [ 244.677213][ T9489] should_fail+0x433/0x5b0 [ 244.681638][ T9489] ? tomoyo_encode2+0x25a/0x560 [ 244.686480][ T9489] should_failslab+0x5/0x20 [ 244.690977][ T9489] __kmalloc+0x74/0x330 [ 244.695142][ T9489] tomoyo_encode2+0x25a/0x560 [ 244.699833][ T9489] tomoyo_realpath_from_path+0x5d6/0x630 [ 244.705483][ T9489] tomoyo_path_number_perm+0x18f/0x690 [ 244.710943][ T9489] ? do_raw_spin_unlock+0x134/0x8d0 [ 244.716196][ T9489] security_file_ioctl+0x55/0xb0 [ 244.721143][ T9489] __se_sys_ioctl+0x48/0x160 [ 244.725750][ T9489] do_syscall_64+0xf3/0x1b0 [ 244.730244][ T9489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.736118][ T9489] RIP: 0033:0x45c6b7 [ 244.739986][ T9489] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.759574][ T9489] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.767986][ T9489] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 244.775943][ T9489] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 244.783894][ T9489] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 244.791844][ T9489] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 244.799799][ T9489] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000e [ 244.814830][ T9489] ERROR: Out of memory at tomoyo_realpath_from_path. [ 244.866809][ T9489] tmpfs: Bad value for 'mpol' 14:51:04 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:04 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ftruncate(r5, 0x2008002) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:04 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:04 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:04 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:04 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 245.122822][ T9526] FAULT_INJECTION: forcing a failure. [ 245.122822][ T9526] name failslab, interval 1, probability 0, space 0, times 0 [ 245.190251][ T9526] CPU: 0 PID: 9526 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 245.198872][ T9526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.208912][ T9526] Call Trace: [ 245.212190][ T9526] dump_stack+0x1e9/0x30e [ 245.216505][ T9526] should_fail+0x433/0x5b0 [ 245.220910][ T9526] ? tomoyo_realpath_from_path+0xd8/0x630 [ 245.226606][ T9526] should_failslab+0x5/0x20 [ 245.231088][ T9526] __kmalloc+0x74/0x330 [ 245.235221][ T9526] ? tomoyo_realpath_from_path+0xcb/0x630 [ 245.240921][ T9526] tomoyo_realpath_from_path+0xd8/0x630 [ 245.246442][ T9526] ? rcu_lock_acquire+0x5/0x30 [ 245.251194][ T9526] tomoyo_path_number_perm+0x18f/0x690 [ 245.256635][ T9526] ? do_raw_spin_unlock+0x134/0x8d0 [ 245.261855][ T9526] security_file_ioctl+0x55/0xb0 [ 245.266776][ T9526] __se_sys_ioctl+0x48/0x160 [ 245.271350][ T9526] do_syscall_64+0xf3/0x1b0 [ 245.275849][ T9526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.281716][ T9526] RIP: 0033:0x45c6b7 [ 245.285590][ T9526] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.305173][ T9526] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.313559][ T9526] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 245.321511][ T9526] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 245.329459][ T9526] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 245.337407][ T9526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 245.345357][ T9526] R13: 0000000000000be6 R14: 00000000004ce096 R15: 000000000000000f [ 245.361722][ T9526] ERROR: Out of memory at tomoyo_realpath_from_path. [ 245.396617][ T9526] tmpfs: Bad value for 'mpol' 14:51:04 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:04 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:04 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:04 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:04 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:05 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 245.815982][ T9568] FAULT_INJECTION: forcing a failure. [ 245.815982][ T9568] name failslab, interval 1, probability 0, space 0, times 0 [ 245.841876][ T9568] CPU: 1 PID: 9568 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 245.850489][ T9568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.860544][ T9568] Call Trace: [ 245.863831][ T9568] dump_stack+0x1e9/0x30e [ 245.868148][ T9568] should_fail+0x433/0x5b0 [ 245.872552][ T9568] ? tomoyo_realpath_from_path+0xd8/0x630 [ 245.878245][ T9568] should_failslab+0x5/0x20 [ 245.882724][ T9568] __kmalloc+0x74/0x330 [ 245.886858][ T9568] ? tomoyo_realpath_from_path+0xcb/0x630 [ 245.892556][ T9568] tomoyo_realpath_from_path+0xd8/0x630 [ 245.898188][ T9568] ? rcu_lock_acquire+0x5/0x30 [ 245.902955][ T9568] tomoyo_path_number_perm+0x18f/0x690 [ 245.908405][ T9568] ? do_raw_spin_unlock+0x134/0x8d0 [ 245.913619][ T9568] security_file_ioctl+0x55/0xb0 [ 245.918584][ T9568] __se_sys_ioctl+0x48/0x160 [ 245.923162][ T9568] do_syscall_64+0xf3/0x1b0 [ 245.927645][ T9568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.933512][ T9568] RIP: 0033:0x45c6b7 [ 245.937379][ T9568] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.956974][ T9568] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.965371][ T9568] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 245.973317][ T9568] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 245.981272][ T9568] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 245.989228][ T9568] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 245.997181][ T9568] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000010 [ 246.007407][ T9568] ERROR: Out of memory at tomoyo_realpath_from_path. [ 246.094453][ T9568] tmpfs: Bad value for 'mpol' 14:51:05 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f00000002c0), 0x0) open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:05 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:05 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:05 executing program 0: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:05 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:05 executing program 0: sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:05 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 246.461285][ T9599] FAULT_INJECTION: forcing a failure. [ 246.461285][ T9599] name failslab, interval 1, probability 0, space 0, times 0 [ 246.515931][ T9599] CPU: 0 PID: 9599 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 246.524547][ T9599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.534599][ T9599] Call Trace: [ 246.537889][ T9599] dump_stack+0x1e9/0x30e [ 246.542209][ T9599] should_fail+0x433/0x5b0 [ 246.546610][ T9599] ? tomoyo_encode2+0x25a/0x560 [ 246.551440][ T9599] should_failslab+0x5/0x20 [ 246.555922][ T9599] __kmalloc+0x74/0x330 [ 246.560064][ T9599] tomoyo_encode2+0x25a/0x560 [ 246.564725][ T9599] tomoyo_realpath_from_path+0x5d6/0x630 [ 246.570454][ T9599] tomoyo_path_number_perm+0x18f/0x690 [ 246.575911][ T9599] ? do_raw_spin_unlock+0x134/0x8d0 [ 246.581138][ T9599] security_file_ioctl+0x55/0xb0 [ 246.586146][ T9599] __se_sys_ioctl+0x48/0x160 [ 246.590724][ T9599] do_syscall_64+0xf3/0x1b0 [ 246.595212][ T9599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.601097][ T9599] RIP: 0033:0x45c6b7 [ 246.604972][ T9599] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.624566][ T9599] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.632959][ T9599] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 246.640912][ T9599] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 246.648862][ T9599] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 246.656810][ T9599] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 246.664773][ T9599] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000011 14:51:06 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) socket(0x1e, 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:06 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 246.731882][ T9599] ERROR: Out of memory at tomoyo_realpath_from_path. 14:51:06 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:06 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 246.805833][ T9599] tmpfs: Bad value for 'mpol' 14:51:06 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:06 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:06 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 247.033730][ T9644] FAULT_INJECTION: forcing a failure. [ 247.033730][ T9644] name failslab, interval 1, probability 0, space 0, times 0 [ 247.059486][ T9644] CPU: 0 PID: 9644 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 247.068096][ T9644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.078141][ T9644] Call Trace: [ 247.081409][ T9644] dump_stack+0x1e9/0x30e [ 247.085713][ T9644] should_fail+0x433/0x5b0 [ 247.090158][ T9644] ? __kthread_create_on_node+0xb2/0x3b0 [ 247.095870][ T9644] ? loop_set_fd+0x14e0/0x14e0 [ 247.100614][ T9644] should_failslab+0x5/0x20 [ 247.105096][ T9644] kmem_cache_alloc_trace+0x57/0x300 [ 247.110384][ T9644] ? loop_set_fd+0x14e0/0x14e0 [ 247.115137][ T9644] __kthread_create_on_node+0xb2/0x3b0 [ 247.120598][ T9644] ? loop_set_fd+0x14e0/0x14e0 [ 247.125357][ T9644] kthread_create_on_node+0x72/0xa0 [ 247.130552][ T9644] ? lockdep_init_map+0x26/0x670 [ 247.135488][ T9644] loop_set_fd+0x6ae/0x14e0 [ 247.139990][ T9644] ? do_raw_spin_unlock+0x134/0x8d0 [ 247.145188][ T9644] lo_ioctl+0xc4/0x21a0 [ 247.149337][ T9644] ? rcu_lock_release+0x5/0x20 [ 247.154090][ T9644] ? tomoyo_path_number_perm+0x58f/0x690 [ 247.159792][ T9644] ? blkdev_common_ioctl+0xf27/0x1b00 [ 247.165161][ T9644] ? lo_release+0x1e0/0x1e0 [ 247.169648][ T9644] blkdev_ioctl+0x2a6/0x5c0 [ 247.174176][ T9644] block_ioctl+0xb6/0xf0 [ 247.178411][ T9644] ? blkdev_iopoll+0xf0/0xf0 [ 247.182987][ T9644] __se_sys_ioctl+0xf9/0x160 [ 247.187564][ T9644] do_syscall_64+0xf3/0x1b0 [ 247.192061][ T9644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.197938][ T9644] RIP: 0033:0x45c6b7 [ 247.201823][ T9644] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.221416][ T9644] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:51:06 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:06 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 247.229821][ T9644] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 247.237781][ T9644] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 247.245738][ T9644] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 247.253692][ T9644] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 247.261645][ T9644] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000012 14:51:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:06 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:06 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:06 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 247.613064][ T9669] FAULT_INJECTION: forcing a failure. [ 247.613064][ T9669] name failslab, interval 1, probability 0, space 0, times 0 [ 247.643495][ T9669] CPU: 1 PID: 9669 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 247.652108][ T9669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.662156][ T9669] Call Trace: [ 247.665436][ T9669] dump_stack+0x1e9/0x30e [ 247.669750][ T9669] should_fail+0x433/0x5b0 [ 247.674216][ T9669] ? __kernfs_new_node+0x8b/0x600 [ 247.679219][ T9669] should_failslab+0x5/0x20 [ 247.683698][ T9669] kmem_cache_alloc+0x53/0x2d0 [ 247.688452][ T9669] __kernfs_new_node+0x8b/0x600 [ 247.693307][ T9669] kernfs_create_dir_ns+0x90/0x220 [ 247.698400][ T9669] internal_create_group+0x1e2/0xd20 [ 247.703724][ T9669] ? up_write+0xe9/0x450 [ 247.707954][ T9669] loop_set_fd+0xf91/0x14e0 [ 247.712445][ T9669] lo_ioctl+0xc4/0x21a0 [ 247.716583][ T9669] ? rcu_lock_release+0x5/0x20 [ 247.721327][ T9669] ? tomoyo_path_number_perm+0x58f/0x690 [ 247.726957][ T9669] ? blkdev_common_ioctl+0xf27/0x1b00 [ 247.732312][ T9669] ? lo_release+0x1e0/0x1e0 [ 247.736799][ T9669] blkdev_ioctl+0x2a6/0x5c0 [ 247.741287][ T9669] block_ioctl+0xb6/0xf0 [ 247.745508][ T9669] ? blkdev_iopoll+0xf0/0xf0 [ 247.750094][ T9669] __se_sys_ioctl+0xf9/0x160 [ 247.754662][ T9669] do_syscall_64+0xf3/0x1b0 [ 247.759146][ T9669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.765015][ T9669] RIP: 0033:0x45c6b7 [ 247.768883][ T9669] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.788463][ T9669] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.796848][ T9669] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 247.804796][ T9669] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:51:07 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x1, 0x0) sendmsg(r4, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 247.812796][ T9669] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 247.820750][ T9669] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 247.828698][ T9669] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000013 [ 247.844178][ T9669] tmpfs: Bad value for 'mpol' 14:51:07 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 247.941653][ T9673] __ntfs_error: 4 callbacks suppressed [ 247.941662][ T9673] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 14:51:07 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:07 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:07 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 248.182833][ T9697] FAULT_INJECTION: forcing a failure. [ 248.182833][ T9697] name failslab, interval 1, probability 0, space 0, times 0 [ 248.201565][ T9697] CPU: 0 PID: 9697 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 248.210170][ T9697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.220225][ T9697] Call Trace: [ 248.223516][ T9697] dump_stack+0x1e9/0x30e [ 248.227854][ T9697] should_fail+0x433/0x5b0 [ 248.232268][ T9697] ? __kernfs_new_node+0x8b/0x600 [ 248.237272][ T9697] should_failslab+0x5/0x20 [ 248.241755][ T9697] kmem_cache_alloc+0x53/0x2d0 [ 248.246509][ T9697] __kernfs_new_node+0x8b/0x600 [ 248.251349][ T9697] kernfs_create_dir_ns+0x90/0x220 [ 248.256464][ T9697] internal_create_group+0x1e2/0xd20 [ 248.261732][ T9697] ? up_write+0xe9/0x450 [ 248.265958][ T9697] loop_set_fd+0xf91/0x14e0 [ 248.270455][ T9697] lo_ioctl+0xc4/0x21a0 [ 248.274599][ T9697] ? rcu_lock_release+0x5/0x20 [ 248.281786][ T9697] ? tomoyo_path_number_perm+0x58f/0x690 [ 248.287416][ T9697] ? blkdev_common_ioctl+0xf27/0x1b00 [ 248.292774][ T9697] ? lo_release+0x1e0/0x1e0 [ 248.297256][ T9697] blkdev_ioctl+0x2a6/0x5c0 [ 248.301758][ T9697] block_ioctl+0xb6/0xf0 [ 248.306006][ T9697] ? blkdev_iopoll+0xf0/0xf0 [ 248.310592][ T9697] __se_sys_ioctl+0xf9/0x160 [ 248.315176][ T9697] do_syscall_64+0xf3/0x1b0 [ 248.319683][ T9697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.325560][ T9697] RIP: 0033:0x45c6b7 [ 248.329448][ T9697] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.349029][ T9697] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.357427][ T9697] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 248.365389][ T9697] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 248.373338][ T9697] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 248.381287][ T9697] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 248.389267][ T9697] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000014 [ 248.416182][ T9697] tmpfs: Bad value for 'mpol' 14:51:07 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 248.514920][ T9706] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 14:51:07 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:07 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:08 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) socket(0x1e, 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 248.753378][ T9730] FAULT_INJECTION: forcing a failure. [ 248.753378][ T9730] name failslab, interval 1, probability 0, space 0, times 0 [ 248.767293][ T9730] CPU: 0 PID: 9730 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 248.775889][ T9730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.785966][ T9730] Call Trace: [ 248.789267][ T9730] dump_stack+0x1e9/0x30e [ 248.793724][ T9730] should_fail+0x433/0x5b0 [ 248.798162][ T9730] ? __kernfs_new_node+0x8b/0x600 [ 248.803293][ T9730] should_failslab+0x5/0x20 [ 248.807781][ T9730] kmem_cache_alloc+0x53/0x2d0 [ 248.812670][ T9730] __kernfs_new_node+0x8b/0x600 [ 248.817539][ T9730] ? kernfs_add_one+0x4b7/0x600 [ 248.822385][ T9730] kernfs_new_node+0x95/0x160 [ 248.827096][ T9730] __kernfs_create_file+0x45/0x2d0 [ 248.832213][ T9730] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 248.837608][ T9730] internal_create_group+0x445/0xd20 [ 248.842898][ T9730] ? up_write+0xe9/0x450 [ 248.847159][ T9730] loop_set_fd+0xf91/0x14e0 [ 248.851689][ T9730] lo_ioctl+0xc4/0x21a0 [ 248.855841][ T9730] ? rcu_lock_release+0x5/0x20 [ 248.860587][ T9730] ? tomoyo_path_number_perm+0x58f/0x690 [ 248.866222][ T9730] ? blkdev_common_ioctl+0xf27/0x1b00 [ 248.871616][ T9730] ? lo_release+0x1e0/0x1e0 [ 248.876120][ T9730] blkdev_ioctl+0x2a6/0x5c0 [ 248.880682][ T9730] block_ioctl+0xb6/0xf0 [ 248.884913][ T9730] ? blkdev_iopoll+0xf0/0xf0 [ 248.889510][ T9730] __se_sys_ioctl+0xf9/0x160 [ 248.894093][ T9730] do_syscall_64+0xf3/0x1b0 [ 248.898593][ T9730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.904480][ T9730] RIP: 0033:0x45c6b7 [ 248.908372][ T9730] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.927971][ T9730] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.936371][ T9730] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 248.944355][ T9730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:51:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 248.952305][ T9730] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 248.960258][ T9730] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 248.968319][ T9730] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000015 14:51:08 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 249.011949][ T9730] tmpfs: Bad value for 'mpol' 14:51:08 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:08 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 249.181940][ T9745] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 14:51:08 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:08 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) socket(0x1e, 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=']) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 249.340394][ T9761] FAULT_INJECTION: forcing a failure. [ 249.340394][ T9761] name failslab, interval 1, probability 0, space 0, times 0 14:51:08 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:08 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 249.406227][ T9761] CPU: 0 PID: 9761 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 249.414843][ T9761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.424890][ T9761] Call Trace: [ 249.428211][ T9761] dump_stack+0x1e9/0x30e [ 249.432529][ T9761] should_fail+0x433/0x5b0 [ 249.436930][ T9761] ? __kernfs_new_node+0x8b/0x600 [ 249.441974][ T9761] should_failslab+0x5/0x20 [ 249.446459][ T9761] kmem_cache_alloc+0x53/0x2d0 [ 249.451205][ T9761] __kernfs_new_node+0x8b/0x600 [ 249.456041][ T9761] ? kernfs_add_one+0x4b7/0x600 [ 249.460918][ T9761] kernfs_new_node+0x95/0x160 [ 249.465579][ T9761] __kernfs_create_file+0x45/0x2d0 [ 249.470669][ T9761] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 249.476027][ T9761] internal_create_group+0x445/0xd20 [ 249.481300][ T9761] ? up_write+0xe9/0x450 [ 249.485529][ T9761] loop_set_fd+0xf91/0x14e0 [ 249.490030][ T9761] lo_ioctl+0xc4/0x21a0 [ 249.494174][ T9761] ? rcu_lock_release+0x5/0x20 [ 249.498920][ T9761] ? tomoyo_path_number_perm+0x58f/0x690 [ 249.504551][ T9761] ? blkdev_common_ioctl+0xf27/0x1b00 [ 249.509904][ T9761] ? lo_release+0x1e0/0x1e0 [ 249.514384][ T9761] blkdev_ioctl+0x2a6/0x5c0 [ 249.518872][ T9761] block_ioctl+0xb6/0xf0 [ 249.523104][ T9761] ? blkdev_iopoll+0xf0/0xf0 [ 249.527668][ T9761] __se_sys_ioctl+0xf9/0x160 [ 249.532248][ T9761] do_syscall_64+0xf3/0x1b0 [ 249.536734][ T9761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.542603][ T9761] RIP: 0033:0x45c6b7 [ 249.546529][ T9761] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.566109][ T9761] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.574512][ T9761] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 249.582462][ T9761] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 249.590429][ T9761] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 249.598418][ T9761] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 249.606367][ T9761] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000016 [ 249.620026][ T9761] tmpfs: Bad value for 'mpol' 14:51:08 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 249.783807][ T9785] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 249.803265][ T9785] ntfs: (device loop1): parse_options(): The gid option requires an argument. 14:51:09 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=']) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 249.879079][ T9788] FAULT_INJECTION: forcing a failure. [ 249.879079][ T9788] name failslab, interval 1, probability 0, space 0, times 0 [ 249.897618][ T9788] CPU: 0 PID: 9788 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 249.906364][ T9788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.916457][ T9788] Call Trace: [ 249.919730][ T9788] dump_stack+0x1e9/0x30e [ 249.924048][ T9788] should_fail+0x433/0x5b0 [ 249.928451][ T9788] ? __kernfs_new_node+0x8b/0x600 [ 249.933453][ T9788] should_failslab+0x5/0x20 [ 249.937941][ T9788] kmem_cache_alloc+0x53/0x2d0 [ 249.942701][ T9788] __kernfs_new_node+0x8b/0x600 [ 249.947564][ T9788] ? kernfs_add_one+0x4b7/0x600 [ 249.952431][ T9788] ? __mutex_unlock_slowpath+0x12d/0x580 [ 249.958061][ T9788] kernfs_new_node+0x95/0x160 [ 249.962757][ T9788] __kernfs_create_file+0x45/0x2d0 [ 249.967849][ T9788] sysfs_add_file_mode_ns+0x2fe/0x3c0 [ 249.973205][ T9788] internal_create_group+0x445/0xd20 [ 249.978472][ T9788] ? up_write+0xe9/0x450 [ 249.982700][ T9788] loop_set_fd+0xf91/0x14e0 [ 249.987192][ T9788] lo_ioctl+0xc4/0x21a0 [ 249.991352][ T9788] ? rcu_lock_release+0x5/0x20 [ 249.996125][ T9788] ? tomoyo_path_number_perm+0x58f/0x690 [ 250.001772][ T9788] ? blkdev_common_ioctl+0xf27/0x1b00 [ 250.007136][ T9788] ? lo_release+0x1e0/0x1e0 [ 250.011640][ T9788] blkdev_ioctl+0x2a6/0x5c0 [ 250.016128][ T9788] block_ioctl+0xb6/0xf0 [ 250.020354][ T9788] ? blkdev_iopoll+0xf0/0xf0 [ 250.024936][ T9788] __se_sys_ioctl+0xf9/0x160 [ 250.030041][ T9788] do_syscall_64+0xf3/0x1b0 [ 250.034622][ T9788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.040502][ T9788] RIP: 0033:0x45c6b7 [ 250.044373][ T9788] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.064084][ T9788] RSP: 002b:00007f356a154a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 250.072490][ T9788] RAX: ffffffffffffffda RBX: 00007f356a1556d4 RCX: 000000000045c6b7 [ 250.080451][ T9788] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 250.088421][ T9788] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 250.096381][ T9788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 250.104376][ T9788] R13: 0000000000000be6 R14: 00000000004ce096 R15: 0000000000000017 [ 250.183251][ T9788] tmpfs: Bad value for 'mpol' 14:51:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:09 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:09 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 250.211964][ T9800] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 250.220101][ C0] [ 250.220105][ C0] ===================================== [ 250.220107][ C0] WARNING: bad unlock balance detected! [ 250.220112][ C0] 5.6.0-rc7-syzkaller #0 Not tainted [ 250.220114][ C0] ------------------------------------- [ 250.220118][ C0] syz-executor.1/9800 is trying to release lock (rcu_callback) at: [ 250.220132][ C0] [] rcu_lock_release+0x0/0x20 [ 250.220134][ C0] but there are no more locks to release! [ 250.220136][ C0] [ 250.220136][ C0] other info that might help us debug this: [ 250.220140][ C0] 1 lock held by syz-executor.1/9800: [ 250.220141][ C0] #0: ffff88804c3700d8 (&type->s_umount_key#54/1){+.+.}, at: alloc_super+0x160/0x760 [ 250.220157][ C0] [ 250.220157][ C0] stack backtrace: [ 250.220164][ C0] CPU: 0 PID: 9800 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 14:51:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 250.220168][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.220170][ C0] Call Trace: [ 250.220174][ C0] [ 250.220183][ C0] dump_stack+0x1e9/0x30e [ 250.220191][ C0] ? rcu_lock_acquire+0x30/0x30 [ 250.220200][ C0] print_unlock_imbalance_bug+0x20b/0x240 [ 250.220209][ C0] ? do_raw_spin_unlock+0x134/0x8d0 [ 250.220220][ C0] lock_release+0x37c/0x720 [ 250.220228][ C0] ? rcu_lock_acquire+0x30/0x30 [ 250.220236][ C0] ? zap_class+0xd30/0xd30 [ 250.220242][ C0] rcu_core+0x7f0/0x1080 [ 250.220256][ C0] __do_softirq+0x268/0x7c5 [ 250.220336][ C0] ? irq_exit+0x223/0x230 [ 250.220345][ C0] irq_exit+0x223/0x230 [ 250.220354][ C0] smp_apic_timer_interrupt+0x113/0x280 [ 250.220362][ C0] apic_timer_interrupt+0xf/0x20 [ 250.220366][ C0] [ 250.220373][ C0] RIP: 0010:console_unlock+0xa25/0xec0 [ 250.220381][ C0] Code: 20 00 74 0c 48 c7 c7 18 d4 0a 89 e8 e5 be 52 00 48 83 3d 15 ae ac 07 00 0f 84 65 04 00 00 e8 12 80 16 00 48 8b 7c 24 10 57 9d <0f> 1f 44 00 00 f6 44 24 07 01 75 52 e8 fa 7f 16 00 eb 63 0f 1f 84 [ 250.220385][ C0] RSP: 0018:ffffc9000487f8e0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 250.220392][ C0] RAX: ffffffff815e260e RBX: 0000000000000200 RCX: 0000000000040000 [ 250.220397][ C0] RDX: ffffc90002999000 RSI: 000000000000cd50 RDI: 0000000000000282 [ 250.220401][ C0] RBP: ffffc9000487f998 R08: ffffffff817a3210 R09: fffffbfff121aff9 [ 250.220405][ C0] R10: fffffbfff121aff9 R11: 0000000000000000 R12: dffffc0000000000 [ 250.220409][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff892be518 [ 250.220419][ C0] ? trace_hardirqs_on+0x30/0x70 [ 250.220425][ C0] ? console_unlock+0xa1e/0xec0 [ 250.220439][ C0] ? __down_trylock_console_sem+0x178/0x1b0 [ 250.220444][ C0] ? vprintk_emit+0x1db/0x3b0 [ 250.220450][ C0] ? vprintk_emit+0x1db/0x3b0 [ 250.220458][ C0] vprintk_emit+0x1f8/0x3b0 [ 250.220466][ C0] printk+0x62/0x83 [ 250.220526][ C0] ? __ntfs_error+0x15e/0x190 [ 250.220535][ C0] __ntfs_error+0x185/0x190 [ 250.220544][ C0] ? parse_options+0x39d/0x1dd0 [ 250.220555][ C0] parse_options+0x3df/0x1dd0 [ 250.220569][ C0] ntfs_fill_super+0x1e2/0x89f0 [ 250.220576][ C0] ? pointer+0x23f/0x7c0 [ 250.220592][ C0] ? snprintf+0x6f/0x90 [ 250.220600][ C0] ? set_blocksize+0x1a8/0x3b0 [ 250.220610][ C0] mount_bdev+0x232/0x340 [ 250.220624][ C0] ? ntfs_mount+0x40/0x40 [ 250.220661][ C0] legacy_get_tree+0xea/0x180 [ 250.220669][ C0] ? ntfs_rl_punch_nolock+0x17d0/0x17d0 [ 250.220677][ C0] vfs_get_tree+0x88/0x270 [ 250.220687][ C0] do_mount+0x17d5/0x2440 [ 250.220726][ C0] ? _copy_from_user+0x116/0x170 [ 250.220737][ C0] __se_sys_mount+0xd3/0x100 [ 250.220747][ C0] do_syscall_64+0xf3/0x1b0 [ 250.220758][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.220764][ C0] RIP: 0033:0x45f29a [ 250.220771][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 250.220775][ C0] RSP: 002b:00007f708f1f3a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:51:09 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) socket(0x1e, 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:09 executing program 5: sched_setattr(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 250.220782][ C0] RAX: ffffffffffffffda RBX: 00007f708f1f46d4 RCX: 000000000045f29a [ 250.220786][ C0] RDX: 00007f708f1f3ae0 RSI: 00000000200000c0 RDI: 00007f708f1f3b00 [ 250.220791][ C0] RBP: 000000000076bf00 R08: 00007f708f1f3b40 R09: 00007f708f1f3ae0 [ 250.220795][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 250.220799][ C0] R13: 0000000000000be3 R14: 00000000004ce052 R15: 000000000076bf0c [ 250.646523][ T9800] ntfs: (device loop1): parse_options(): The gid option requires an argument. 14:51:09 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=']) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:10 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 250.810302][ T9827] tmpfs: Bad value for 'mpol' 14:51:10 executing program 5: sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 250.903186][ T9836] ntfs: (device loop1): parse_options(): Unrecognized mount option . 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='wi\n', 0x3}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 250.961721][ T9836] ntfs: (device loop1): parse_options(): The gid option requires an argument. [ 250.982009][ T9853] tmpfs: Bad value for 'mpol' 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 251.029364][ T9853] tmpfs: Bad value for 'mpol' 14:51:10 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:10 executing program 5: pipe(0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 5: pipe(0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:10 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 251.227928][ T9879] tmpfs: Bad value for 'mpol' 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 5: pipe(0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 251.290548][ T9879] tmpfs: Bad value for 'mpol' [ 251.295762][ T9882] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. 14:51:10 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:10 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 251.499699][ T9911] tmpfs: Bad value for 'mpol' 14:51:10 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:10 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 251.585667][ T9911] tmpfs: Bad value for 'mpol' 14:51:10 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:10 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 251.816143][ T9948] tmpfs: Bad value for 'mpol' 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 251.940936][ T9948] tmpfs: Bad value for 'mpol' 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:11 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 252.188058][T10000] tmpfs: Bad value for 'mpol' 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 252.294091][T10000] tmpfs: Bad value for 'mpol' 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:11 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 252.449872][T10038] tmpfs: Bad value for 'mpol' 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 252.539031][T10038] tmpfs: Bad value for 'mpol' 14:51:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6(0xa, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) 14:51:11 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:11 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:11 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:12 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:12 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 252.870379][T10081] tmpfs: Bad value for 'mpol' 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 252.987368][ T398] tipc: TX() has been purged, node left! [ 253.006148][T10081] tmpfs: Bad value for 'mpol' 14:51:12 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:12 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:51:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:12 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:12 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:12 executing program 4: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 253.154776][T10128] __ntfs_error: 7 callbacks suppressed [ 253.154785][T10128] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. [ 253.184765][T10133] tmpfs: Bad value for 'mpol' 14:51:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$inet6(0xa, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 253.258382][T10133] tmpfs: Bad value for 'mpol' 14:51:12 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:12 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:12 executing program 4: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:12 executing program 4: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 253.411797][T10167] tmpfs: Bad value for 'mpol' 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 14:51:12 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 2: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 253.514768][T10170] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. [ 253.542923][T10167] tmpfs: Bad value for 'mpol' [ 253.548420][T10183] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:51:12 executing program 2: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) [ 253.576881][T10183] ntfs: (device loop5): parse_options(): Invalid fmask option argument: 000000000x0000000000000000 14:51:12 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:12 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:12 executing program 2: r0 = socket(0x0, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:13 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 253.837396][T10215] tmpfs: Bad value for 'mpol' 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000002, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 253.859040][T10225] ntfs: (device loop1): parse_options(): Unrecognized mount option 0x0000000000000000. [ 254.011449][T10215] tmpfs: Bad value for 'mpol' [ 254.016644][T10229] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:51:13 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) [ 254.052180][T10229] ntfs: (device loop5): parse_options(): Invalid fmask option argument: 000000000x0000000000000000 14:51:13 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:13 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 254.199461][T10254] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 254.247935][T10254] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier option argument: 0x00000x0000000000000000 [ 254.253662][T10266] tmpfs: Bad value for 'mpol' 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) 14:51:13 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 254.388396][T10268] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 254.522244][T10266] tmpfs: Bad value for 'mpol' 14:51:13 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:51:13 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:13 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:51:13 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 254.680997][T10312] tmpfs: Bad value for 'mpol' 14:51:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 254.786157][T10312] tmpfs: Bad value for 'mpol' 14:51:14 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:14 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) [ 254.968530][T10352] tmpfs: Bad value for 'mpol' 14:51:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) [ 255.050046][T10361] tmpfs: Bad value for 'mpol' 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 255.196566][T10361] tmpfs: Bad value for 'mpol' 14:51:14 executing program 5: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:14 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 255.344752][T10389] tmpfs: Bad value for 'mpol' 14:51:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 255.460430][T10389] tmpfs: Bad value for 'mpol' 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:14 executing program 5: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:14 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:14 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:15 executing program 5: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_mult', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) [ 255.800494][T10440] tmpfs: Bad value for 'mpol' 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) 14:51:15 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) [ 255.927216][ T398] tipc: TX() has been purged, node left! 14:51:15 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 255.988244][T10440] tmpfs: Bad value for 'mpol' 14:51:15 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) 14:51:15 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, 0x0, 0x0) [ 256.190958][T10484] tmpfs: Bad value for 'mpol' 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 256.215760][T10486] tmpfs: Bad value for 'mpol' 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:51:15 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:15 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 256.403148][T10484] tmpfs: Bad value for 'mpol' 14:51:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:15 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:15 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 256.538223][T10522] tmpfs: Bad value for 'mpol' 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 14:51:15 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 256.645131][T10533] tmpfs: Bad value for 'mpol' 14:51:15 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:15 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:16 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 256.733736][T10533] tmpfs: Bad value for 'mpol' 14:51:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) [ 256.991555][T10575] tmpfs: Bad value for 'mpol' 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:51:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(0x0, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:16 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 257.188559][T10575] tmpfs: Bad value for 'mpol' 14:51:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 257.274891][T10614] tmpfs: Bad value for 'mpol' 14:51:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000', @ANYRESHEX=0x0]) 14:51:16 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 257.389756][T10614] tmpfs: Bad value for 'mpol' 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:16 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(0x0, 0x0, &(0x7f0000000100)={'ntfs\x00'}, 0x6, 0x2) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:16 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:16 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) [ 257.609154][T10654] tmpfs: Bad value for 'mpol' 14:51:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x2) [ 257.686538][T10654] tmpfs: Bad value for 'mpol' 14:51:16 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:16 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 14:51:17 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',', @ANYRESHEX=0x0]) lsetxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x0) 14:51:17 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:17 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) [ 257.924043][T10692] tmpfs: Bad value for 'mpol' 14:51:17 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) [ 258.067347][T10709] tmpfs: Bad value for 'mpol' 14:51:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:17 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 258.126389][T10692] tmpfs: Bad value for 'mpol' 14:51:17 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:17 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:17 executing program 2: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:17 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 258.386699][T10725] __ntfs_error: 35 callbacks suppressed [ 258.386707][T10725] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 258.402854][T10735] tmpfs: Bad value for 'mpol' 14:51:17 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:17 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 258.464172][T10735] tmpfs: Bad value for 'mpol' 14:51:17 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:17 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 258.598658][T10754] tmpfs: Bad value for 'mpol' [ 258.605480][T10752] ntfs: (device loop0): parse_options(): Unrecognized mount option . 14:51:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 258.730897][T10762] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 258.742267][T10754] tmpfs: Bad value for 'mpol' 14:51:18 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) 14:51:18 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x3c}}, 0x0) [ 258.903734][T10778] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 258.925725][T10781] tmpfs: Bad value for 'mpol' [ 259.021197][T10781] tmpfs: Bad value for 'mpol' 14:51:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:18 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 259.109973][T10798] ntfs: (device loop2): parse_options(): Unrecognized mount option . 14:51:18 executing program 1: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 259.179167][T10804] tmpfs: Bad value for 'mpol' 14:51:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) [ 259.232887][T10804] tmpfs: Bad value for 'mpol' 14:51:18 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 259.278944][T10810] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 259.286739][T10821] ntfs: (device loop2): parse_options(): Unrecognized mount option . 14:51:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:18 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:18 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) [ 259.430114][T10833] tmpfs: Bad value for 'mpol' 14:51:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:18 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) [ 259.490207][T10833] tmpfs: Bad value for 'mpol' [ 259.520612][T10848] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 259.520762][T10840] ntfs: (device loop2): parse_options(): Unrecognized mount option . 14:51:18 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10c, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:18 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 259.658428][T10850] ntfs: (device loop0): parse_options(): Unrecognized mount option 0x0000000000000000. 14:51:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:18 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 14:51:19 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 259.775467][T10870] tmpfs: Bad value for 'mpol' 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 14:51:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) [ 259.862517][T10870] tmpfs: Bad value for 'mpol' 14:51:19 executing program 5: r0 = socket(0x10, 0x20000000802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 14:51:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:51:19 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [], 0x3}) 14:51:19 executing program 5: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 14:51:19 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000']) 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:51:19 executing program 5: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) [ 260.119945][T10909] tmpfs: Bad value for 'mpol' 14:51:19 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) 14:51:19 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:51:19 executing program 5: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0)