e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r36, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r32, @ANYRESOCT=r35, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r34, @ANYRESOCT]], @ANYRES32=r29, @ANYRES32=r31, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r33, @ANYRESDEC=0x0, @ANYRES32=r37, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) r38 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r40 = socket$nl_route(0x10, 0x3, 0x0) r41 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r42 = inotify_init() r43 = getegid() r44 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r44, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r45 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r46 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r47 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r47, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r41, @ANYRES32=r40, @ANYRES32, @ANYRES32=r42, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r46, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r42, @ANYRESOCT=r45, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r44, @ANYRESOCT]], @ANYRES32=r39, @ANYRES32=r41, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r43, @ANYRESDEC=0x0, @ANYRES32=r47, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) r48 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r48, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r50 = socket$nl_route(0x10, 0x3, 0x0) r51 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r52 = inotify_init() r53 = getegid() r54 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r54, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r55 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r56 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r57 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r57, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r51, @ANYRES32=r50, @ANYRES32, @ANYRES32=r52, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r56, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r52, @ANYRESOCT=r55, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r54, @ANYRESOCT]], @ANYRES32=r49, @ANYRES32=r51, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r53, @ANYRESDEC=0x0, @ANYRES32=r57, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) getgroups(0x3, &(0x7f0000000540)=[r53, 0xee01, 0xee01]) r59 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r61 = socket$nl_route(0x10, 0x3, 0x0) r62 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r63 = inotify_init() r64 = getegid() r65 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r65, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r66 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r67 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r68 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r68, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="454171f6220b7d8601ad2ab9d2e88a3241a5afba8dc2cc8f9368b39c0106627593a43a0a527ce59f97ea3cb536af142b84139f0032696e8b378dfb649851acac94104cbbc7bc1ad2d994f3df51867c4eb675f3924a9544e52d464a9445c08a67b66a171d13019a1e00ccca6d9b056d7f307f1b0400ec5231f5552fe3bec653b08bda274cf5cabc40b75d62502b0dc35f9ff975b7f0b984f6106ecaeef48e93c114f352a051f7b6eadc3428c48d12c47e82d80efbe8a5004e9b13c3b25f7624684e96489f8def3997f9ea9bd6e3b68ea727a236850b0b7f8719e93099728566d35fb4ed859bd62f6fc9e2e7bb46da720857fc58dc5b93bdfb6ec1", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r62, @ANYRES32=r61, @ANYRES32, @ANYRES32=r63, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r67, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r63, @ANYRESOCT=r66, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r65, @ANYRESOCT]], @ANYRES32=r60, @ANYRES32=r62, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r64, @ANYRESDEC=0x0, @ANYRES32=r68, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) r69 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r71 = socket$nl_route(0x10, 0x3, 0x0) r72 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r73 = inotify_init() r74 = getegid() r75 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r75, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r76 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r77 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r78 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r78, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r72, @ANYRES32=r71, @ANYRES32, @ANYRES32=r73, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r77, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r73, @ANYRESOCT=r76, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r75, @ANYRESOCT]], @ANYRES32=r70, @ANYRES32=r72, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r74, @ANYRESDEC=0x0, @ANYRES32=r78, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) r79 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r79, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r81 = socket$nl_route(0x10, 0x3, 0x0) r82 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r83 = inotify_init() r84 = getegid() r85 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r85, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r86 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r87 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r88 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r88, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r89 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r88, 0x40049409, r89) r90 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000}, 0x0, 0x0, r89, 0x0) recvmsg(r90, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="454171f6220b7d8601ad2ab9d2e88a3241a5afba8dc2cc8f9368b39c0106627593a43a0a527ce59f97ea3cb536af142b84139f0032696e8b378dfb649851acac94104cbbc7bc1ad2d994f3df51867c4eb675f3924a9544e52d464a9445c08a67b66a171d13019a1e00ccca6d9b056d7f307f1b0400ec5231f5552fe3bec653b08bda274cf5cabc40b75d62502b0dc35f9ff975b7f0b984f6106ecaeef48e93c114f352a051f7b6eadc3428c48d12c47e82d80efbe8a5004e9b13c3b25f7624684e96489f8def3997f9ea9bd6e3b68ea727a236850b0b7f8719e93099728566d35fb4ed859bd62f6fc9e2e7bb46da720857fc58dc5b93bdfb6ec1", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r82, @ANYRES32=r81, @ANYRES32, @ANYRES32=r83, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r87, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r83, @ANYRESOCT=r86, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r85, @ANYRESOCT]], @ANYRES32=r80, @ANYRES32=r82, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r84, @ANYRESDEC=0x0, @ANYRES32=r90, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) r91 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r91, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r93 = socket$nl_route(0x10, 0x3, 0x0) r94 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r95 = inotify_init() r96 = getegid() r97 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r97, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r98 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r99 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r100 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r100, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r94, @ANYRES32=r93, @ANYRES32, @ANYRES32=r95, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r99, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r95, @ANYRESOCT=r98, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r97, @ANYRESOCT]], @ANYRES32=r92, @ANYRES32=r94, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r96, @ANYRESDEC=0x0, @ANYRES32=r100, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x7}, [{0x2, 0xa, r5}, {0x2, 0x0, r7}, {0x2, 0x3, r10}, {0x2, 0x1, r12}, {0x2, 0x2, r13}, {0x2, 0x4, r15}, {0x2, 0x4, r16}], {0x4, 0xb}, [{0x8, 0x2, r17}, {0x8, 0x1, r23}, {0x8, 0x0, r33}, {0x8, 0x2, r43}, {0x8, 0x1, r58}, {0x8, 0x2, r64}, {0x8, 0x2, r74}, {0x8, 0x9, r84}, {0x8, 0x8, r96}], {0x10, 0x6}, {0x20, 0x1}}, 0xa4, 0x1) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40224873863a7672, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb08daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:26 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000000), 0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r0}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1340.788649] audit: type=1804 audit(1575814646.149:685): pid=23058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x689, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 1340.926150] JFS: discard option not supported on device [ 1340.937181] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1340.952814] JFS: discard option not supported on device 14:17:26 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x1, 0x101) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1341.013768] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x806, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1341.114019] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:26 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1341.146945] audit: type=1804 audit(1575814646.509:686): pid=23187 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:26 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000000), 0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r0}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1341.342633] JFS: discard option not supported on device [ 1341.367771] JFS: discard option not supported on device [ 1341.384533] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:29 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb09daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:29 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xe80, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:29 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:29 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000000), 0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r0}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1343.924723] audit: type=1804 audit(1575814649.279:687): pid=23320 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:29 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r5}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x22048002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00', @ANYRES16=r8], 0x2}}, 0x6000081) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="ef18b3a3", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x2000c918}, 0x4009004) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r9, 0x40049409, r10) sendmsg$NBD_CMD_STATUS(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa1181}, 0x8, &(0x7f0000000200)={&(0x7f0000000180)={0x74, r8, 0x502, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffffffffffff}, @NBD_ATTR_TIMEOUT={0x22, 0x4, 0xfffffffffffffff8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x8000}, 0x48050) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1344.027712] JFS: discard option not supported on device [ 1344.034690] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:29 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3580, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1344.094017] JFS: discard option not supported on device [ 1344.144414] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:29 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004a00}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, r4, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbcf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x764}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8747b7e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x50}, 0x20000880) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1344.197600] audit: type=1804 audit(1575814649.549:688): pid=23442 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1344.308545] audit: type=1804 audit(1575814649.579:689): pid=23440 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:17:29 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1344.382695] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1344.517982] audit: type=1804 audit(1575814649.879:690): pid=23518 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1344.695718] JFS: discard option not supported on device [ 1344.701507] JFS: discard option not supported on device [ 1344.711302] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:32 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0adaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3f00, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:32 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) tkill(r2, 0x40000060) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000000)) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000180), 0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="0af3ffff002000001839f0f84f5c79e7e35f057940abe14ed88d1109d8a5e11fe5aa3ce3f1360c3bce8e4d72b02a1d4288e395885389df996c3512fd89af534d9ab3dbf61807414cc48285228744ee751c8005a031a054f90145a6f788d4d43a686f8465f54679ca5513cb7e64ff634014a9fe6e09e0e1641af36d19743546000a05596178afacbd70d62a27b6e9e1f205016520ea4def18d7db9d283b933e8d2386de8461810171e05db428f401e5047a0d89e42bef25fc97a1d5c7c2333f8d"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0xfffffffffffffff4) prctl$PR_SET_PTRACER(0x59616d61, r1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1346.973793] audit: type=1804 audit(1575814652.329:691): pid=23579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4305, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1347.039061] cgroup: fork rejected by pids controller in /syz2 14:17:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1347.180308] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:32 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1347.226134] JFS: discard option not supported on device [ 1347.232057] JFS: discard option not supported on device [ 1347.271999] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1347.297155] audit: type=1804 audit(1575814652.659:692): pid=23640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4788, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:32 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1347.542469] audit: type=1804 audit(1575814652.899:693): pid=23719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1347.582645] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0bdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:33 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4888, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1347.794231] audit: type=1804 audit(1575814653.149:694): pid=23769 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:33 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x6488, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1347.836086] JFS: discard option not supported on device [ 1347.843296] JFS: discard option not supported on device [ 1347.851086] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1347.933515] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1348.116851] audit: type=1804 audit(1575814653.479:695): pid=23895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1348.162321] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:35 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0x3}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:35 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:17:35 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x800e, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1350.177616] JFS: discard option not supported on device [ 1350.186125] JFS: discard option not supported on device [ 1350.195848] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:35 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0cdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:35 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000140)=0x9) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r2, 0x3f) socket$netlink(0x10, 0x3, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000"/20, @ANYRES32=0x0, @ANYBLOB="0e0000000000000008001b00fcffffff"], 0x28}}, 0x0) getsockopt$sock_int(r5, 0x1, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpid() r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) prctl$PR_SET_PTRACER(0x59616d61, r0) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x2, 0x9, 0x6, 0xf8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:17:35 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8035, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:35 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:17:35 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$cont(0x39, r3, 0x5, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x5) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000140)=0x4) ptrace$cont(0x9, r1, 0x0, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a0009000100000021b8b401a94414f738b8c07bfc124331d70213719d90b7d8d2c428d690551a902ce862a72e76985cdd743377e9f1b766a444bd8aab1ef86d442f3a9fd3a5970d0ed8c167002fc165a062241caf4ddf4ec2c4"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r7, 0x40049409, r8) ioctl$SNDRV_PCM_IOCTL_STATUS(r7, 0x80984120, &(0x7f0000000180)) [ 1350.436286] audit: type=1804 audit(1575814655.799:696): pid=24079 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1350.493739] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:35 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8100, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1350.637757] JFS: discard option not supported on device [ 1350.645510] JFS: discard option not supported on device [ 1350.673159] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1350.751623] audit: type=1804 audit(1575814656.109:697): pid=24197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:36 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r2, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x3ff) 14:17:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:36 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x8000, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x24}, @broadcast}, 0xc) [ 1350.891780] audit: type=1800 audit(1575814656.249:698): pid=24278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 [ 1350.948589] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1351.038957] audit: type=1804 audit(1575814656.399:699): pid=24317 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:38 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:38 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:17:38 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8847, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:38 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = dup2(r3, r5) ioctl$ASHMEM_PURGE_ALL_CACHES(r6, 0x770a, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0ddaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1353.496769] audit: type=1804 audit(1575814658.859:700): pid=24332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:38 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8848, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:38 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$setopts(0x4200, r2, 0x6216ef63, 0x8) tkill(r1, 0x3f) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='vmnet0\x00'}, 0x30) ptrace$cont(0x18, r4, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x40, 0x9, 0x6, 0xf7}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1353.537701] JFS: discard option not supported on device [ 1353.543163] JFS: discard option not supported on device 14:17:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1353.654662] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1353.663604] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:39 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x3, 0x6}, {0x0, 0x7}], r6}, 0x18, 0x1) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x20, &(0x7f0000000180)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@index_on='index=on'}, {@default_permissions='default_permissions'}], [{@euid_gt={'euid>', r6}}, {@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, '}cpusettrusted'}}]}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000240)={0x2, 0x1000, 0x2, 0x6, 0x9}) 14:17:39 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8864, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:39 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1353.857943] audit: type=1804 audit(1575814659.219:701): pid=24460 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1354.041133] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:41 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:41 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000140), &(0x7f0000000180)) setuid(r2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) fcntl$getownex(r8, 0x10, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0edaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:41 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8906, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:41 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1356.554147] audit: type=1804 audit(1575814661.909:702): pid=24593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:41 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r2) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:42 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:42 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1356.837120] audit: type=1804 audit(1575814662.199:703): pid=24710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1356.931171] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:42 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1357.034172] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:42 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1357.062383] audit: type=1804 audit(1575814662.419:704): pid=24825 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb0fdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:42 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:42 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', 0x0, 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1357.510939] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1357.772573] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:45 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:45 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 14:17:45 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x543, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:45 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', 0x0, 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb10daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1359.823705] audit: type=1804 audit(1575814665.169:705): pid=25070 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:17:45 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ustat(0x10000, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x180c0, 0x0) read(r4, &(0x7f0000000240)=""/158, 0x9e) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0xff, @mcast1, 0x8}, @in6={0xa, 0x4e23, 0x0, @local, 0x9}, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @rand_addr=0x8}, 0x100}], 0x54) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2202000}, 0xc, &(0x7f0000000700)={&(0x7f0000000380)={0x348, r6, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x916d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa379}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe75}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x81, @dev={0xfe, 0x80, [], 0x22}, 0x10001}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x80, @mcast2, 0x10001}}}}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x96f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4ef1bf3c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x72}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5000}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x348}, 0x1, 0x0, 0x0, 0x8000}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1359.859730] audit: type=1804 audit(1575814665.179:706): pid=25070 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:17:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) socket$inet_dccp(0x2, 0x6, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:45 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', 0x0, 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1360.025888] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:45 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x608, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1360.143279] audit: type=1804 audit(1575814665.499:707): pid=25200 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) socket$inet_dccp(0x2, 0x6, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1360.287810] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:45 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x689, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:45 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1360.427324] audit: type=1804 audit(1575814665.789:708): pid=25315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1360.541702] JFS: discard option not supported on device [ 1360.552971] JFS: discard option not supported on device [ 1360.576791] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:48 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 14:17:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:48 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x806, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:48 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:48 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1362.996685] audit: type=1804 audit(1575814668.359:709): pid=25332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1363.067345] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1363.166060] JFS: discard option not supported on device [ 1363.172181] JFS: discard option not supported on device [ 1363.179734] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:48 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4040, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) ptrace$cont(0x18, r1, 0xa6, 0x8) 14:17:48 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe80, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:48 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:48 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0xfffffffffffffffe, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1363.412497] audit: type=1804 audit(1575814668.769:710): pid=25460 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1363.506905] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1363.540462] JFS: discard option not supported on device [ 1363.589716] JFS: discard option not supported on device [ 1363.625810] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1363.668741] audit: type=1804 audit(1575814669.029:711): pid=25580 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:51 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 14:17:51 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x900, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) syz_open_procfs(r3, &(0x7f0000000280)='net/tcp\x00') ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000240)=0x800) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40800, 0x0) sendto$llc(r6, &(0x7f0000000140)="38c608a12320104f00f357a40646aaafc0b48becf3fac314411d24b65b21a01acf542dd875b6515907640f0291de43f9fb489cc7e55340076d166f479a5d51842fd95e796101d55991c2f1ffbd9ae22fe2c3c6e28a4af2e40c104ee0190215db31b7f8d7d641b82703f20f400328744d7330c76af6cba7f49c7bd112c22c2b3a8622f6af39c868e1f04902", 0x8b, 0x60, 0x0, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:51 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3580, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:51 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x0, 0x0, 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb12daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1366.028041] audit: type=1804 audit(1575814671.389:712): pid=25592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:51 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3f00, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1366.180535] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:51 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x0, 0x0, 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1366.238733] JFS: discard option not supported on device [ 1366.245133] JFS: discard option not supported on device [ 1366.251251] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1366.310892] audit: type=1804 audit(1575814671.669:713): pid=25712 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1366.378551] JFS: discard option not supported on device [ 1366.399861] JFS: discard option not supported on device [ 1366.420452] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:51 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x0, 0x0, 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:51 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4305, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1366.522611] audit: type=1804 audit(1575814671.869:714): pid=25822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1366.596482] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1366.642918] JFS: discard option not supported on device [ 1366.658127] JFS: discard option not supported on device [ 1366.663851] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:54 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:17:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb13daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:54 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4788, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:54 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:54 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:54 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000001c0)={0x0, 0x800, 0x101, [], &(0x7f0000000180)={0x990a75, 0x4, [], @p_u8=&(0x7f0000000140)=0x1}}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) tkill(r3, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1369.139519] audit: type=1804 audit(1575814674.499:715): pid=25949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1369.167774] JFS: discard option not supported on device 14:17:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1369.204114] JFS: discard option not supported on device [ 1369.240712] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:54 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4888, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1369.256734] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1369.327963] audit: type=1804 audit(1575814674.689:716): pid=26071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:54 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpgrp(r0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt(r4, 0xd2c, 0x7fffffff, &(0x7f0000000140)=""/18, &(0x7f0000000180)=0x12) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0xd, 0x6, 0xf6, r6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1369.374569] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:54 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb14daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1369.601588] JFS: discard option not supported on device [ 1369.608693] JFS: discard option not supported on device [ 1369.614593] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1369.651425] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1369.853472] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:57 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:17:57 executing program 5: socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:57 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6488, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)={0x30, r7, 0x23f, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r7, 0x20, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x400, 0x80000000, 0x6, 0x1000}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008004}, 0x226eb229e1218146) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r9, 0x40049409, r10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x1000, 0x9, 0x9, 0x245, 0x9}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x9, 0x1, 0x200, 0x10000, 0xf27d, 0x9, 0x2, 0x7, r11}, 0x20) 14:17:57 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb15daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1372.186864] audit: type=1804 audit(1575814677.549:717): pid=26212 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:57 executing program 5: socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1372.273536] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) getrusage(0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405002604000000004501000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1372.304148] audit: type=1804 audit(1575814677.579:718): pid=26219 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1372.363071] JFS: discard option not supported on device 14:17:57 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x800e, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1372.393875] audit: type=1804 audit(1575814677.749:719): pid=26333 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1372.417032] JFS: discard option not supported on device [ 1372.437750] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:17:57 executing program 5: socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:57 executing program 2: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:17:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:58 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1372.631199] audit: type=1804 audit(1575814677.989:720): pid=26490 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1372.740640] JFS: discard option not supported on device [ 1372.769440] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1372.783071] JFS: discard option not supported on device 14:17:58 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8035, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:58 executing program 2: [ 1372.827222] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1372.884391] audit: type=1804 audit(1575814678.239:721): pid=26568 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:58 executing program 2: 14:17:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb16daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:58 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x440, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getpgid(r1) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r7, 0x40049409, r8) ioctl$NS_GET_OWNER_UID(r8, 0xb704, &(0x7f00000001c0)=0x0) fsetxattr$security_capability(r3, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0xfffff525, 0xff}, {0x4, 0x9}], r9}, 0x18, 0x7) ioctl$SNDCTL_DSP_SETDUPLEX(r6, 0x5016, 0x0) ioctl$FICLONE(r3, 0x40049409, r4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r2, r4, 0x11, 0x1}, 0x10) ptrace$cont(0x18, r1, 0x0, 0x0) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r10, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r12, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:58 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:58 executing program 2: [ 1373.159742] audit: type=1804 audit(1575814678.519:722): pid=26654 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:17:58 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="f1c6ca60e12072422f83fbae253baef96e36d2f884eb2c0832f12b92dd3672a3ca8fa81353e062a1410561dc73fc900b6b10950604142c99a67abd37b72dfcd2c45c7abb14933daed6df"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f00000002c0)=ANY=[@ANYBLOB="80845c0008000000a74163a2e8691bcb05a299dc5af7e7a901008000c4000000"]) ptrace$setopts(0x4206, r1, 0x0, 0x20) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x2, 0x1ff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000240)={r7, 0x9}, &(0x7f0000000280)=0x8) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:17:58 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8100, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:58 executing program 2: [ 1373.397061] audit: type=1804 audit(1575814678.759:723): pid=26702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1373.413462] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:17:58 executing program 2: [ 1373.518185] JFS: discard option not supported on device [ 1373.537996] JFS: discard option not supported on device 14:17:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1373.555267] audit: type=1804 audit(1575814678.909:724): pid=26812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1373.558296] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1373.699378] audit: type=1804 audit(1575814679.059:725): pid=26817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1373.722902] EXT4-fs (sda1): re-mounted. Opts: (null) 14:17:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb17daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:17:59 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:17:59 executing program 2: 14:17:59 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8847, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:17:59 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1373.907483] audit: type=1804 audit(1575814679.269:726): pid=26832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1374.000345] JFS: discard option not supported on device [ 1374.028058] JFS: discard option not supported on device [ 1374.041831] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1374.092713] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1374.194059] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb14daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:01 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:01 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8848, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:01 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb18daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:01 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)={0xfff}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) ioctl$IMSETDEVNAME(r5, 0x80184947, &(0x7f0000000140)={0x7d5b, 'syz1\x00'}) prctl$PR_SET_PTRACER(0x59616d61, r1) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f0000000500)=ANY=[@ANYBLOB="9c8be58f0a00000001000000186bb4a57bf68846ed5bf71fd9036b7b07d2d7435b031d2f7e99a6a0f5bc93df0f7fb452d38876e06c91d8098e72ad382992acbad14fe9add6553d34e82af0ade4f62b5a2b22a65bcfdee9c60fef16671ea6dee049cf797a7e589e90797d45beee4996e1e41dd96fc24819b00b940bb3a991af6c3a33c20c92c347f2c6d7e4011b7534c3377afb996bab43f3409579a8efa540e495b4e89a9656e95af3f2571b4ca1e4dc4579fa133e0e5a17cff59a7168064fbc8fb495ce39044b8a73a73f"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r9, 0x40049409, r10) r11 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r9, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb0, r11, 0xe2090086b0b9a2d, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r7}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24040080}, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1376.413447] JFS: discard option not supported on device [ 1376.450618] JFS: discard option not supported on device 14:18:01 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:01 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$poke(0x4, r1, &(0x7f0000000000), 0x67) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0x0, 0x68) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:01 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8864, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1376.483129] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1376.515186] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1376.575229] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:02 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0xffffffffffffffff, r1, 0xfffffffffffffffe, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:02 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:02 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000dfd000/0x200000)=nil, 0x200000}, &(0x7f0000000180)=0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$cont(0x20, r5, 0x8001, 0xfffffffffffffff9) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1377.000791] JFS: discard option not supported on device [ 1377.013972] JFS: discard option not supported on device [ 1377.020653] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1377.042164] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:02 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8906, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb12daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:02 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r1) sendto$unix(r0, &(0x7f0000000000)="30a7707e7f013eb383e68d2a714c061431805108a1", 0x15, 0x54000, 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r3) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 14:18:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb19daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:02 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1377.259810] kauditd_printk_skb: 2 callbacks suppressed [ 1377.259825] audit: type=1804 audit(1575814682.619:729): pid=27246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1377.386981] audit: type=1804 audit(1575814682.619:730): pid=27246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:02 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1377.532000] JFS: discard option not supported on device [ 1377.545054] audit: type=1804 audit(1575814682.669:731): pid=27220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1377.583834] JFS: discard option not supported on device [ 1377.598344] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1377.621725] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1377.636024] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:03 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1377.836092] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:03 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:03 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:03 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb1adaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1378.165818] JFS: discard option not supported on device [ 1378.172875] JFS: discard option not supported on device [ 1378.189968] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:03 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1378.433015] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1378.506268] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1378.609317] JFS: discard option not supported on device [ 1378.617151] JFS: discard option not supported on device [ 1378.624586] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1378.674610] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:05 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'security.', ',&md5sumwlan0\x00'}, &(0x7f0000000180)=',\x00', 0x2, 0x3) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f00000001c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:05 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:05 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb1bdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:05 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3f) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c000000010000001860d7409f1ad21ab7d087063d71dae2de40e4a290d2b464d4554668e7057b08de281db6f746667fb4d353d118771af79039e4869bb95e677733f798393aec278a23c142f2537bd6cefb68add6a016134f316766ac68a18e590e3f303f70c5eb460de56c6131ed78555cf14909f6e565ef1af24ee99d4617b3031a86d7bbdb56d2bc0ca763928565ed658b48843de180b77e852b4d3c284305e4320fbccb6cc64cd0afbc834cb00de54bee812d46737a34ce6714"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x1, &(0x7f0000000140)='\x00', 0xffffffffffffffff}, 0x30) sched_getattr(r0, &(0x7f0000000000)={0x30}, 0x30, 0xeb797d941ce10d7) ptrace$cont(0x18, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1380.299683] JFS: discard option not supported on device [ 1380.327123] JFS: discard option not supported on device [ 1380.430703] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1380.431174] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:05 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x2}, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:05 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:06 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x800400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1380.697621] JFS: discard option not supported on device [ 1380.780513] JFS: discard option not supported on device [ 1380.821622] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x8}, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1380.896557] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:06 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) timer_delete(0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1380.957390] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:06 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb1cdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:06 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) sendmsg$nl_crypto(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@getstat={0xe0, 0x15, 0x722, 0x70bd2b, 0x25dfdbff, {{'ctr-serpent-avx\x00'}, [], [], 0x400, 0x2400}, ["", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x40088}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1381.101583] JFS: discard option not supported on device [ 1381.121294] JFS: discard option not supported on device 14:18:06 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1381.182505] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:06 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x0, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1381.394375] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1381.426750] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:06 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x800, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r1, 0x0, 0x2, 0x3ff, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x2) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x2, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:07 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:07 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r6}}, 0x18) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r11, 0xae9a) ioctl$KVM_RUN(r11, 0xae80, 0x0) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r13, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r13, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r13, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r15 = ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r15, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r15, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r15, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) fcntl$getownex(r15, 0x10, &(0x7f0000000300)) r16 = fcntl$getown(r2, 0x9) ptrace$pokeuser(0x6, r16, 0x100, 0x4d2) r17 = getpid() sched_setscheduler(r17, 0x5, &(0x7f0000000380)) r18 = getpid() sched_setscheduler(r18, 0x5, &(0x7f0000000380)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x7, 0x0, 0x2, r18}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) [ 1381.891688] JFS: discard option not supported on device [ 1381.947631] JFS: discard option not supported on device [ 1381.965505] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1382.064230] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb1ddaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:07 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:07 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r8, 0xae9a) ioctl$KVM_RUN(r8, 0xae80, 0x0) fcntl$getownex(r8, 0x10, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:07 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:07 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x0, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:07 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:07 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r5, @ANYBLOB="00042dbd7000fcdbdf2503000000080005000800000008000500ff0700004c00010008000b007369700008000900700000000c000700090000000000000008000b00736970001400030000000000000000000009000000000001080009006b000000080009001e0000001c00010408000100856000000800020007000000080006006f766600200003001400060000000000000000000b00000000000000080005000000800108000400b100000008000500faffffff080005000400000008000600018000001c000200080009000800000008000b000a000000080002004e200000"], 0xe8}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) [ 1382.214536] JFS: discard option not supported on device [ 1382.239900] JFS: discard option not supported on device [ 1382.253839] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:07 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:07 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x543, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:07 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x0, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:07 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:08 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = open(&(0x7f0000000240)='./file0\x00', 0x4000, 0x191) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x1f, 0x4000) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clock_gettime(0x4, &(0x7f0000000200)) r5 = dup(r4) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, &(0x7f0000000280)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) ptrace$cont(0xffffffffffffffff, r9, 0x1, 0x7) [ 1382.758605] JFS: discard option not supported on device [ 1382.798739] JFS: discard option not supported on device [ 1382.804322] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1382.834586] audit: type=1804 audit(1575814688.189:732): pid=29487 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1383.040123] EXT4-fs: 2 callbacks suppressed [ 1383.040151] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb1edaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:08 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:18:08 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x608, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:08 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:18:08 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x689, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1383.386738] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:09 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1383.683144] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1383.845967] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:11 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x44400, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1d0, r3, 0x502, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff4695}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe0000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x20000050}, 0x4044155) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:11 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x806, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:11 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb21daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:11 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1386.010419] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:11 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0xe80, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1386.071104] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1386.193445] JFS: discard option not supported on device [ 1386.223365] JFS: discard option not supported on device 14:18:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1386.240569] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:11 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x81, 0x100000) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="09e4000001e7b4cf03"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x80000000, 0x8, 0x6, 0xf4}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:11 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:11 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0xc2) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000140)='./file0\x00', 0x4001, 0x10) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) ptrace$setregs(0xd, r5, 0xfffffffffffffffd, &(0x7f0000000000)="22be4a45748eb397f6b411a0c69de41b9b") ptrace$cont(0x9, r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000040)={0x36, 0x3, 0x11, 0x8, 0x9, 0x3, 0x2, 0x4b, 0x1}) 14:18:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:11 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x3580, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1386.551448] JFS: discard option not supported on device [ 1386.573226] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1386.581671] JFS: discard option not supported on device 14:18:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb22daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb11daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1386.628919] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:12 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x3f00, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:12 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1386.939883] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1386.968534] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1387.051946] JFS: discard option not supported on device [ 1387.074369] JFS: discard option not supported on device 14:18:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x80002) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) [ 1387.096296] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:12 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x4305, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:12 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1387.260563] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1387.330719] ptrace attach of "/root/syz-executor.2"[26181] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ     @ = [ 1387.439066] JFS: discard option not supported on device [ 1387.446053] JFS: discard option not supported on device [ 1387.485156] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:15 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb23daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:15 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x4788, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:15 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x80002) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) 14:18:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1389.794005] JFS: discard option not supported on device [ 1389.810893] JFS: discard option not supported on device 14:18:15 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x4888, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1389.817192] ptrace attach of "/root/syz-executor.2"[26181] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ     @ = [ 1389.817206] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1389.855878] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:15 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:15 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:15 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) poll(&(0x7f0000000000)=[{r5}, {0xffffffffffffffff, 0x1000}, {r2, 0x3}], 0x3, 0x4b) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$VIDIOC_ENUM_FREQ_BANDS(r7, 0xc0405665, &(0x7f0000000200)={0x1, 0x5, 0x0, 0x1, 0x40, 0x1, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r9, 0x40049409, r10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r10, 0x80045300, &(0x7f0000000140)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:15 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x6488, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1390.339534] JFS: discard option not supported on device [ 1390.407359] JFS: discard option not supported on device [ 1390.419404] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1390.432588] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb24daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001000000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:15 executing program 2: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)="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") socket$inet6(0xa, 0x2, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newsa={0x140, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@ipv4={[], [], @multicast2}, 0x0, 0x6c}, @in6=@ipv4={[], [], @empty}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x22}]}, 0x140}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) open_by_handle_at(0xffffffffffffffff, 0x0, 0x120301) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) msgctl$IPC_RMID(r1, 0x0) 14:18:15 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:15 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x800e, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:16 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8035, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1390.651088] JFS: discard option not supported on device [ 1390.669589] JFS: discard option not supported on device [ 1390.679509] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001000000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:16 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001000000"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') [ 1390.918379] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 14:18:18 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb25daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:18 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20100, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x3ff, 0x1f, 0x1, 0x400}, {0x8, 0xe0, 0x2, 0x7f}, {0x7, 0x5b, 0x40, 0xff}]}, 0x10) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) rt_tgsigqueueinfo(r6, 0x0, 0x16, &(0x7f0000000140)={0x31, 0x0, 0x1}) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1393.368935] JFS: discard option not supported on device [ 1393.372930] audit: type=1804 audit(1575814698.729:733): pid=31777 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1393.374381] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1393.386533] ptrace attach of "/root/syz-executor.2"[26181] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   @ = [ 1393.501213] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:18 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:18 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:19 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8847, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x100000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x0, 0x0) poll(&(0x7f00000003c0)=[{r3}], 0x1, 0x9) [ 1393.725774] audit: type=1804 audit(1575814699.079:734): pid=32096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 [ 1393.748196] JFS: discard option not supported on device [ 1393.781825] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(&(0x7f0000002f80)='./file0\x00', &(0x7f00000094c0)='./file0\x00') 14:18:19 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000140)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000300)="6635080000000f22e03ef36d660fc776076e99800000c00f326635000400000f3066b98604000066b8db2a000066ba000000000f300f015c00b8ca0e8ec80fec2466660f76c76635000001000f22c00f01cb"}], 0xaaaaaaaaaaaab8a, 0x0, 0x0, 0x5c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0x10, 0x100000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0x20}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x0, 0x2200}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:18:19 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8848, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1394.106051] audit: type=1804 audit(1575814699.469:735): pid=32311 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:18:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, &(0x7f00000094c0)='./file0\x00') [ 1394.267018] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb26daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1394.402898] audit: type=1804 audit(1575814699.759:736): pid=32331 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:18:19 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8864, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1394.521381] JFS: discard option not supported on device [ 1394.540242] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1394.773760] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1394.889742] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:21 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0x0, 0x9}, 0x18) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$RTC_WIE_ON(r7, 0x700f) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:21 executing program 2: syz_open_dev$dmmidi(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) socket(0x18, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff874cc11fbb8ffffff79a4f0ff00000000b7060000000000812d6405000000009ece7f4fa45e0025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000d83990832ffdd40a409f01f6147c8f6fd267bf41106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a613782ccdfc129d2c67b2c70da0037ad1efc966f1cfdc4ea29f673efc20c8dec082bc6de68ab0a5ebf4ee6025351040000006cc871311ab25868e1d9a0142636973f338d2d41c41e415a2bcc922a3aa71489fad041e59cc9f6e79e0993c96e4c43518cf72e4bcff56cf5a863efb43ea7c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a57b31031cc158a0a4c6dd4880c767f39a161b050abc5a34588ea19114caebb7995b9648cb25861a8edf8a602525da1ee4c379101fc3ec26c55268f03520aaf96e1c9cd26345d4a3ad0e04535ad3e8f22f2aea3a7b2dbc308162f34531e411fb56502a8100f6f87b104d73e8bc158a6f0cf7ffedad084d5d5381bccf8e5999cc35b6b8c07d33c3e3acc7a6103540fea0923f0b0f5b96f50fe980efb958c2035ef0eee2e"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1, 0x4, 0x10}, 0xc) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x84be}}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) 14:18:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, &(0x7f00000094c0)='./file0\x00') 14:18:21 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:21 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x8906, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb27daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1396.445869] audit: type=1804 audit(1575814701.799:737): pid=32652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:18:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, &(0x7f00000094c0)='./file0\x00') 14:18:22 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r5 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x800, 0x800) statx(r5, &(0x7f0000000180)='./file0\x00', 0x1000, 0x4, &(0x7f00000001c0)) ptrace$cont(0x9, r1, 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$RTC_PIE_OFF(r7, 0x7006) [ 1396.683971] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:22 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1396.803739] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1396.896949] audit: type=1804 audit(1575814702.259:738): pid=401 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:18:22 executing program 2: poll(0x0, 0x0, 0x4d) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd1a, 0x0, 0x0, 0x800e003c6) r1 = dup(r0) recvmsg(r1, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/196, 0xc4}], 0x1}, 0x0) shutdown(r1, 0x0) 14:18:22 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:22 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x5000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r4) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:22 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:22 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(0xffffffffffffffff, 0x40044104, &(0x7f0000000140)=0x40) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sched_getattr(r6, &(0x7f0000000000)={0x30}, 0x30, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1397.261750] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1397.293919] audit: type=1804 audit(1575814702.649:739): pid=542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/" dev="sda1" ino=24 res=1 14:18:22 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1397.408166] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/104, 0x68}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) readv(r3, &(0x7f0000002ac0)=[{&(0x7f0000000040)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r2, 0x0) 14:18:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/5, 0x5}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/104, 0x68}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r4 = dup(r3) execve(0x0, 0x0, 0x0) shutdown(r4, 0x0) r5 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) readv(r5, &(0x7f0000002ac0)=[{&(0x7f0000000040)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r2, 0x0) 14:18:22 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x2, 0x5, 0x2}}}}}}, 0x0) 14:18:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb28daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800010000000000000000000200000200000008000000000800060002200000"], 0x24}}, 0x0) 14:18:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfdbe) [ 1397.815550] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:23 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001800)=[{{&(0x7f0000001480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001900)=""/66, 0x42}, {&(0x7f0000001580)=""/210, 0xd2}, {&(0x7f0000001680)=""/154, 0x9a}], 0x3, &(0x7f0000001880)=""/91, 0x5b}, 0x8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r4 = creat(0x0, 0x10) write$binfmt_script(r4, 0x0, 0x0) r5 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000140)=0x7) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80605414, &(0x7f0000000080)=""/166) r6 = eventfd2(0x8ca0, 0x80800) splice(r6, &(0x7f0000000100), r5, &(0x7f0000000180)=0x9562, 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'veth0_to_hsr\x00'}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) 14:18:23 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1397.948847] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:23 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x2}}}}}}, 0x0) [ 1398.237702] JFS: discard option not supported on device [ 1398.243267] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1398.350119] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:25 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x6, 0x0, 0x9, 0x6, 0xf6, r5}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'nr0\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r6 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r5, r6, 0x0, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') read(r0, 0x0, 0x0) 14:18:25 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8}}}}}}, 0x0) 14:18:25 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb29daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:25 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x1f, 0xfffffffffffffffc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:25 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) [ 1400.517658] JFS: discard option not supported on device [ 1400.523103] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1400.599036] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x543}}}}}}, 0x0) 14:18:26 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x6) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6}}) [ 1400.847632] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:26 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10902, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000012c0)={&(0x7f0000000180)={0x1138, 0x11, 0xa, 0x20, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x9}, [@generic, @generic="758d5fab2e90cff484efddcedd3bc407e412f1b4c3ca224d6544b869f530f2ab199d4650f6b4440321344b0050ca2f8b441f883073ab8ce33b79ffb0857d178b6253b30a8c8d0a551b63d31c5d067ce2c41eecc41485055cf32f2447c59056", @generic="1dd2e1d78ab6f0b8c95fc313180e0663771b8a9204ced9e4f348e8adc401f24cace68dcd04f15253bbb137da29ea815bf4558de2bfc550703bbab0edf9ac96a3809751b9a4c79d0526ad6eefab15d38a3484ed61132e064063bfdddccd6d4b926e5b8622c4065bb8a8e72dc2bc8ca2dc8fa67d75d952476e335af3b973ff40a2b54170ff5a11e9a67e7cd755f79391181dc8457beb8df317c931a7a3dca64abafbb00d6a22424ed9964940d2986af04b13fd400556b33cbb00711d17e45a13a2d5573bd435d50c40aa54bcd7ab161f44ab22c22ee965dd5a4e1595b8cda0e11981e452fae86448e9389b7ce42e0c48355a975f167fa1a8519921979cff0eec97a1b86996ec79dc646c8610c9626dfc85b307757adeecabb179f3066cd643a39b9f2c14fe5efd3c92f3d0b620b606689c62b24dc69f7b5be8c75f864ad8ae010bcacfaf1dada20268f29b1d513ffb5afd1a2fe5bfc3a7ef9d2fd7f285c8103c98bfd96624b5b5ecca8f9ce737a16d9466a352564bdcf0e505a5a0c0cebf38fe38db17ced052059cc3bf3f8bbfaade2a6bfa63ebf6bc3c74b60b89161ae5dc3b2745ae90f29e0b7d09418a59fdeb01ff019b8295d5bbeb53ad51abe8a577219309091bedac9f5a38f1ed4438ac6859485c267739f80765995c8ca262c083ffe7d998321a9800697b9e4d417a2cac2b3675f45b49ccc562d5881543934244a399a8e089282f0a03918620765d5ca4e420dd4c65838ce351be95ce61b603747c0a43d5aabcba7dff20f7b2c9be35f81a632bcc12d7a1e299773c43794dceac195a1ba7ee3f571cbbde2f052565032d9ccceecfde55b47aa1d226afb82b73b99fff78cffc077076b460b9fdf2eb0b93ce74b3b44a6c6af28f99e012784aab3994b9414c31205a3d2e43a0b6dd7ae9b84094f28d69f98e95a376d77e702d846b4181aa034b1c90be59419b647979c22fb96770ac3310a421a44ce0c81f66266b36936d5d21a45adc16a3fc957e6ea5321afe22b08791c6ffe6c96b4be1feacaba8fbfe9d96769409f10b17d963f85953151805a2ddae0525f38045d0f5e556d3f7e5312502c66c0e143b6cd156152bad34eeaca5208e7ee247bf91f73d8e42b6b787f6358739b861f09269e98a39621994c0b66697d9a6205b596e0c48828cd6da34e4101f0dc0052a83afd8bf5d7bdaf54eb4b30705bff8c50d77509dc2651119346da63975412e57053eacc0818ee1b624b2804576e55c2266d9ad035fc14f376a13e0c948cb672f218cb0c99901b2a2311cf399f8c0d698170bff3d285397b94b5fc23d87a731970b69729bc26c80c63e9cdae80be038aef6717257ff41d26b51264a1257c6590e6fdb7db0570893009d37c0b46d804ac21c499c554d2dde3053d93a7f57e3cc9baa89abd7a0a98ad613f561898d33d07ea817a0f07ddd368e3c5db333cf4c10a3fdc2cf29f3d158d2f980b3bbd7815862c18d17bafc8d4d403ef8c893cd2dd91a38acd530eaf79bff13ad6e6e7f411dfa4d1e0b4b4bbc62006d58e8802fd90f9cf9a7b086742fb70c5028405aebd322dbb298f26b02a21e739d2e3edb360fc2894b2deeaefa664932f780d329c55993ececd3a062c3f60aecf9f95c3d00f4e57d1918a36b3958dbb2623626b86a2b64df6c6406fd97451a0cbdd80a32f0147bb4c71d31654055ef63a71b3e17f2014803beba219d0f7b0b7f3f0e98e25982949867f3635d639210471f0570b67c4a55f2ee8253c85c909c4d41e968e00eaaaf8e63d226163e056e7323e143330eed86427328f9d95b0ceb0c8116417d1a4b8c12190d901ab2ac969dffe890c3d7f1f05c84c6e236505e07eb3f56a25816b498fc5e570c865f2ea84b63ee805959cd14a286838dd4dc969f97fdb144e50388322912268203a59fd27a051035968555cd90e1c99d96dd47269d3d762a07c6fae75e4784ee0897afd60d20434fcc5a1857821a436b7df0b01dd0282c070ce226492656d55ed9c5dc8acba25f9136e3214f3feb266025f710321097725533786f55e78e44246479713a69c171df0ff1e9d9892c18baf3ca526e24d14d54b45921584e426a7aa32bf0323032bf530ec7b6a4fb7214f7c31fb2c97b5a00cfb981e47a777f9e4becc90e33cd69348361a0e542c799630f4e69d5bfbad2e61fcada3f8592abe5c4bc46dcd229a85bff4c5e53f983838b648f5b8518e7c449fbe88a30ff60380176393ee45ea422ff0a10d86177b445fbad59b43d5efb259d6dd73d2569be2b315b2e7d676cb38d5e3bd118d306db40b216ffe1db2e0ed7b94305e396f8ca53b1f29067351a201ef13102891e5da9eb5f3fea95e4ef1405e9d61dfa33328f2ef07356748cb0317e969b864e002097446121aa9627ddf8248be0c10ff3bd49e79cadd555af1c8238d8cc41079b4b088081af270698e5d897ff4c151fb47225b61bc6b459148465a4a4771a0ded0e4522e2cd3e9a36dd2c298ffd5303ad33be131580311bfb652cb180b839e5e6c3e6dc859ce232e31bf0a6746774751b9a0ae4cac850a4593966d511fe11cb2343444dcd83d338515c1138413d58cef3eb6177e7e9c7226ccc38ed35ff7732df22ede28cc9d2cadb319f8e8be019ba88efda876c11ec5f22b182dc68d07bc5c368dce7250bb63a6874edc9cfdc551ca4e620e8d1cdc9ac77792df7687d1af6d4f37c9035e743ef6e205a76c14948b7221abc01f8e59e193e305303864230eb0ed6b813bcc44fec1424ade3c27c9e0f812932bdc665c74968a1e2085a226517dc839f1285328b1d7b4d5af863df933beff9928d6f8947d7dda5051be7cca62e77368d682299b76577e5ad92acb159405713641a81bc931a24027f8bbbc5e17453ed1ee4743b77414d0bfd9f07b431a93ace512a01ea15546d4cdd618584595d4fa4c6229ebd92a2127d0bb42ac55732247285aec771afc46a828ed18b50050e73ee5e766faa087aece72638bdef815bac56a28b2d7993e1fda99bd411ec80fefd50893d97bb7bc21edd8368fb32abbb4b5614c2abe151930c921d49c91b3aa9162869ab4d61294ec45f3e76f250074af6342b7e076f25274e13435a81d222a92ed760b7ae529adc773956f0705e7f5654cd02ea6eea42b759c7b20b1e949472165c6ae5d3c646a37777799c4c6005fc10a6d650051699c0379c6c4b2a6669b29999e5f2cc5a1f2cc6f1abeef205c6da6106657ddb780d4415a863442d33ff5961ee58c63c2b52baf71c270a6c7dd4d4329cd4bb924a90275ed043d56c49bcccf5434ed2da28f0ad3945e4dcae9ba40dd0745be2e95317a7277822af2c45d245406994687c060be6a196ac1dcfdf53b342320274f6a0c503df1999a7f1f6d4671f9232282810ab76fcee4f103b85629c9908345305e85fd5fb85b394660dfecffe8fa3e2457f19a3ef1eca5e8621ea2e95779f50951584951bfd4d74756a83e66de316b848d93a0158eda2ce3a9b8caa98095eccc99bb1bc8df916bec1ec2343be31b528f62524ab2b469181e774b0395836443bb29d72be1ca46fe2196657d9ef8d370c38480508e191132d95721e8bcd559addd86b735d5c19f4313122f0d4b11a1921412b652168c28c26c0cc42808394ab1f2c0374bb5cda25812dd194b058d2af59ed1d680c74b8c9a7b5ff84abc588d1be5c21ffcd533f61cca855ca1b445ddd7e7ba0b88e8cd40acf6185852958a58415240f2130e8212267e2b054a6a0611777af6de1130edcb9a15b22a00f3670bd33123d6418c3da50d59495e3b141602ad311988b7252063ade59be402341843e6b53f54383257ef056ae8c305e1cf3ed0ffa9d8f707d42350a63f7c6303d106f4431dbbb37aaf4c2b3bbba998afb2147f688445dd09a116212f16da76f99d3f3600947b8313d488f5a9c221ec761c2e2929cdbec371e5b1a623220b14d0e1b0b3e7b5e70531c25eb94ffb71b4d622d0c492f7248eb97b20a658fb17945a2b305880c84e2bee91aceaaba543f59dded7a7fe573a6ec33d67672e232cea4572f23b47086de9fa8e004f40e1eb21d44aa7a9d187b4dc6bffe2e53d16f2f2b21aadab9f789e4ce36f019380260dfe718b06bc14177ca184d102c8ee4b7848743751ca9c140943fe452b225ea17ee95528543975c02eb9e5da8b6ff7139a2b3269d421427283fb2ea75b666232c03818dd5ecbb715fdbe51ad19bbf36024073901f67e4afc0a16f8a16e92701385fe5c36f389755dc52b826fa04fe391d5732922f754cdee71958554da6c81ff03ca6fe3cb539df22eaa84f08a6167c8750b33f011377a7207107346bcf90ccb6071f3124d35418b55fc941bef3262f8c62b456c1fad5e4e12fd6e5ad71cb51b3f5377757dbfbad302f0e057a9bb61f6b8e978f22282d1d5731c390a2b890d8390cbe318e3b5bfd758fc031bb0e99672caa7f73de8852098cd9a9e0b4305f76c243e0453bcb1ce45dab4d91c216d90445e1627bc4cf97c5b63227f3729259607967dd59f2cf09c6294d09f8adf967256ec3b41d23439fb85bd03eddbf745f543b54e710041bbeb4e0b7cc87f44417eca8565b2611eb11cb928fc4073c397e708ba8e0d4a796175190d3b04c43b74549a247955680a34ad5baf5169277cf99931ccf9892bd0387e569596c5f902b008660137d2a3da7092f23a610263f5f55a3ade66da62d100e153691ee4a6a76338893e6442fa0690430d3ed09bd0472aee0c9175dd59db8821a41b1c9e847bf6238f9228f0b6ab8e54266616d5694d438d83d33ef5a72b4c509098f4f1fab05ebb08a861ada3dccb6b96dc9abe51d500e5183790dac7f28b8c55277705cea19c011ef08e6944ac4d7a0c71b94675f6dd12e439ebf50f543b40a6ca265fd6ae4748c2e1dbf0c7da63f90a5c9f5e9fda20886d78c075f98c15c1b05218f3d0b1246ce83677691ebbd134799aeedbca02c4778cb906e0b92d32d8895abdcd433cb1d35f412eb56f0515858e6d0b702fe68a25d38389a1a9a17ff4dc05953be497641d236cff635d5d12aaf251c43e216f74e2c89e2a15317f819690b09c1e1c2ff9657e320778c0e11bfceb7a61c053391776be779a9b46738bfe1838c1303c202abcc38fca98d4bea9669339a07168e0fdf52759f21ccc0a497082d0fb176fdab50c029f172f16dea5be67a10c4bbee3cd2a1b7aab83fae92e56b18360b6ad8437f9ab337d0cfa7550c99f4295d1dcdb66b7306277f3d70467208d0d5200e03168d3dbcdb2ee17922610c3c2f3308b5fabdad98ed4f4e47d8a4b51f65fbb1f89609343156ffe6e7ebcbe9f5af02436d6b89091264adb25d07a270f2e63fb0d37a318c5a2e0b32db2998e3babc9e4f668d2b979dd26cde25f91882a5f0c865fc668e1120ec56be5e3ad05b1dfe361232a9ca7d261de0fa5193860a67f1a338272ee3f782e508b23f28c3abf8cf10fe1a406f2100c3f41e23266350a267f25fbd79db1ab37dcf2a57b20d7ad6991e8bd35b96c89bd08f6790d2d000c3a0fa97428f964066f2ca5f73cad3bbaf3d36f0d6524efda697979f017bff9278695a2f3121c46588fcd958a9b3c2b85922f40fdc872449b1110d6d87296f4d4bbd11a4dd30ef65969532eaf65688d9693d2bb5e23beecb70ac35a1953e2c6a9c8b4ede0da1aa4834b2c78c1afd92127ecb4a190206e88cad3e037f0e9fb01e61650cec5d2d7c7911f9f9f87635a8698b864e9f1ea4a9742b197e01769034048520b90934db195ab45cdee984648abd4b9bd9c50704ed659d284bee80bb56d67dac3c422579774e", @typed={0x14, 0x4e, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x23}}}, @generic="5956d5a443c938756434ec19e5707b7e49205969f1c85fd613524e986a4257ffced329576801142dcc9891066439bb82f51c0782108f91bb1f220746e1578d33dfc4701ff8f06caa311e1d23a6b1c14ab638946f8ec1a98dacde32b04191689445446c25b61188535d455b9e58581e93a3e852d4a0b4bd836404b861f38e8e5eb6e81ab4296133fc18bce39da38bf025a67b60473d1adf4362f2ecf1751e0069aa498936235d82a09bc37d0daad51b39"]}, 0x1138}, 0x1, 0x0, 0x0, 0x2098}, 0x20080000) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1400.882361] JFS: discard option not supported on device 14:18:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x608}}}}}}, 0x0) [ 1400.953316] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2adaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:26 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:26 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) connect$vsock_dgram(r6, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 14:18:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x689}}}}}}, 0x0) 14:18:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00w\xf5\xfa\x00\x00\x84\xef\xb9\x80\xd6\xf2\x00\xa8\xf3\xcb\r\xf1\xd5%B\x00\xb2\f\xea\x9e\x00'/42) getdents64(r0, &(0x7f0000000080)=""/208, 0xd0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xfffffffe, 0x0, 0xc, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@resize='resize'}]}) 14:18:26 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) socket$inet(0x10, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000240)) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850020001f00000007000000000000009500d40000000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0xb9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r4, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3f) [ 1401.445171] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:26 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x806}}}}}}, 0x0) [ 1401.517104] JFS: discard option not supported on device [ 1401.535196] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:26 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000580)='`', 0xffffff2d}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 1401.669208] JFS: Cannot determine volume size 14:18:27 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0xe80}}}}}}, 0x0) 14:18:27 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1401.756475] JFS: Cannot determine volume size 14:18:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) [ 1402.065738] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1402.211659] JFS: discard option not supported on device [ 1402.226101] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2bdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:27 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:27 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x3580}}}}}}, 0x0) 14:18:27 executing program 5: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) syz_open_dev$ttys(0xc, 0x2, 0x1) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) openat$cgroup_type(r1, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) mlockall(0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1cI\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:27 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802116481ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) write$fb(r6, &(0x7f0000000140)="10ed6df5f3eb4185d2316622994308ecec73eeb66c579d93a2601b4b4fa91b8d1837799108867058c40b4721f720da979dc24597ee4743ccc26eb5f2165c71a5c1beecbea8ac8da5dfce419b8e16180c0f227c8dd67f3e27644e67da3ca8a93c1a25a48c437131ac8050dcd11974ce", 0x6f) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:27 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x3f00}}}}}}, 0x0) 14:18:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8080, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000280)={0x4, 0x4, 0x81, 0x1, 0xffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = semget$private(0x0, 0x0, 0x20) semctl$SETVAL(r3, 0x2, 0x10, &(0x7f0000000180)=0x100) creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x62202, 0x0) write$FUSE_DIRENT(r4, &(0x7f00000003c0)=ANY=[@ANYRESOCT], 0x17) eventfd2(0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x101000000, 0x0) write$P9_RLERROR(r6, &(0x7f00000001c0)={0x12, 0x7, 0x2, {0x9, '/dev/kvm\x00'}}, 0x12) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r5, 0x0, 0x7fffffff) sendfile(r5, r5, &(0x7f0000000140)=0x8800, 0x8800000) 14:18:27 executing program 5: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x101000000, 0x0) socket$inet(0x10, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x3, 0x402, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) pwritev(r1, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x281000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write(r0, &(0x7f0000000000), 0x52698b21) [ 1402.533389] JFS: discard option not supported on device [ 1402.593349] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1402.652046] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:28 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:28 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:28 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x4305}}}}}}, 0x0) [ 1402.868922] JFS: discard option not supported on device [ 1402.874402] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1402.902953] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:28 executing program 5: 14:18:28 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x6e8, 0x3, 0x9, 0x6, 0xf6, r5}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:28 executing program 2: 14:18:28 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2cdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:28 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x4788}}}}}}, 0x0) 14:18:28 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100000018827cc2d573b7ccad6813547301df0f797a6089c038b566c849383eb3f90828f3b275ee2e4ec900835b1fcc1830c3d6"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x40}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r4, 0x2, 0x6}, &(0x7f00000001c0)=0x8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000100)=r0) prctl$PR_SET_PTRACER(0x59616d61, r1) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000200)={[], 0x4, 0x0, 0x9, 0x6, 0x5}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:28 executing program 2: 14:18:28 executing program 5: [ 1403.173288] JFS: discard option not supported on device [ 1403.225480] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:28 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x81) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b", 0x20000000001}, 0x60) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 14:18:28 executing program 5: creat(0x0, 0x3ace8a6cb96ed753) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500197f09004b0101048c590188ffffcf5d3474ff9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 14:18:28 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x4888}}}}}}, 0x0) 14:18:28 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:28 executing program 4: r0 = getpgrp(0xffffffffffffffff) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) write$snddsp(r2, &(0x7f0000000180)="2bc25bec973cd8bb5da3403ddca6ba0654a9af5f2d20ad49ce50dd06b0d0771b038c0ddacfa16b3ed76f34c4f3301014b332d64d3fd7923ace2298a0ec2aa4e732ba163b8561a66a", 0x48) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x15, 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r5 = creat(&(0x7f0000000200)='./file0\x00', 0x1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000500)=ANY=[@ANYBLOB="0a0000010000000018f7d37687f10c96f4effcc96555f1b1172f342ca777e8f030a10221385fdb198dbc69abddbc420bd218eec5efb59306f814cce6429778b706a33027a94ff4eb3a441d9a802cdba5d14de9a8c258375fd674654ea8f2345b5eaab30bead847e74c1204b64410b6229b54b0cb8c13368f16411bc033d8248f5606924a95723cd707d217bb58ea061a0b0df0217f6efbd21d6598872e154fa1c09d62c73984f4d435a6b3ec0b4ad093fb6b06bf3fa0b087c5aef4e40d29b767982d483d70ef2e2dcca90a4575ac91510320ec6f6690cc9eb018a882a756168224249d21882a9b5dc9922bebd73a4dd0"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) getpeername$packet(r6, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000002c0)={@local, 0x63, r8}) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3f) r9 = getpid() r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) sched_setscheduler(r10, 0x5, &(0x7f0000000380)) gettid() ptrace$cont(0x18, r9, 0x0, 0x0) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r4) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x48) fcntl$getownex(r11, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r13, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) 14:18:28 executing program 2: [ 1403.541127] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -107 0 [ 1403.626177] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:29 executing program 5: 14:18:29 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x6488}}}}}}, 0x0) 14:18:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2ddaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:29 executing program 2: [ 1403.834981] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1403.843128] JFS: discard option not supported on device [ 1403.853456] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:29 executing program 5: 14:18:29 executing program 2: 14:18:29 executing program 5: 14:18:29 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:29 executing program 2: 14:18:29 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x800e}}}}}}, 0x0) [ 1404.230406] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1404.251023] JFS: discard option not supported on device [ 1404.262350] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1404.500871] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:31 executing program 2: 14:18:31 executing program 5: 14:18:31 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:31 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8035}}}}}}, 0x0) 14:18:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2edaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:31 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r5, 0x40049409, r6) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r7, 0x40049409, r8) ioctl$SOUND_PCM_READ_CHANNELS(r7, 0x80045006, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r5, 0x0, 0x8, &(0x7f0000000000)='selinux\x00', 0xffffffffffffffff}, 0x30) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/\x00', r3}, 0x10) r11 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r11, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r11, 0x40049409, r12) r13 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r13, r12, 0x0, 0x1d, &(0x7f0000000340)='(vmnet1@keyringmd5sum@cpuset\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r9, r10, 0x0, 0x5, &(0x7f0000000200)='$%\'.\x00', r14}, 0x30) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:32 executing program 5: 14:18:32 executing program 2: [ 1406.687469] JFS: discard option not supported on device [ 1406.702228] audit: type=1804 audit(1575814712.059:740): pid=3819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1406.711595] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000000)={0x0, {0x10000, 0x101}}) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1406.739613] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8100}}}}}}, 0x0) [ 1406.846293] audit: type=1804 audit(1575814712.059:741): pid=3819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:32 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:32 executing program 2: 14:18:32 executing program 5: 14:18:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x10007b) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1407.009586] audit: type=1804 audit(1575814712.059:742): pid=3819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1407.097317] JFS: discard option not supported on device [ 1407.102781] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8847}}}}}}, 0x0) 14:18:32 executing program 2: [ 1407.324269] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:32 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:32 executing program 5: 14:18:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000162636128d18a90aa9a42481bc908cf17424194121325592f22c347d02b20ad35f3ec482a95faf04e6889707176dc3d3aea1c55b929425d3b7c376f56ef4de38c05ba27ade9e3d2c5cd1beb2a592e0e1a3bba105fb417386bf68e02d57afa097f9b85ff6d006b0866ce855da1cf7dcb6989a91ed7f482399e456300081ada57e51d9a702303e5e2b9133acdbddda99fd0396e73ff9709e8ece3b6070de1d2e679f9ee18deb69b54d42e255afce7ef21791fa078761568dcf3140"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000180)=""/26, 0x1a}, &(0x7f00000001c0), 0x2}, 0x20) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x121a40, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, &(0x7f0000000140)={0x3, 0x8001, 0x9, 0x7ff, 0xf, 0x3ff}) prctl$PR_SET_PTRACER(0x59616d61, r1) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r8, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r11, 0xae9a) ioctl$KVM_RUN(r11, 0xae80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:32 executing program 2: 14:18:32 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8848}}}}}}, 0x0) 14:18:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb2fdaea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:32 executing program 2: 14:18:32 executing program 5: [ 1407.543901] JFS: discard option not supported on device [ 1407.563363] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:33 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_rerxoute', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000140)={0x7ff, 0x0, 0x0, "7299d298bfb6981e795df5767174215517e2601f27a397dd94987cfb43c75dc9", 0x3d23e70defd5dcbc}) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x8) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:33 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8864}}}}}}, 0x0) 14:18:33 executing program 2: 14:18:33 executing program 5: 14:18:33 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1407.835739] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:33 executing program 2: 14:18:33 executing program 5: 14:18:33 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x8906}}}}}}, 0x0) 14:18:33 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0a000000ff010000807726724f7de33994e3c294f2818e30641e9dfe4d1f864d374ad5bf338172fcb3c0ac837608eb1228726200000000775b6322c6d81401dd255fc22bb6dea5518d12b218fd5b6f444d2af0748c2175b228ae3df142ddcd6449396f32fc07972b42667482e178ba54a95b9a824c267c08799868673e845c7e92cc262cf73be5e761e5083a08efa756603aa3ff629bf6109930547a9681feb678fd82763af7842df36ea0c7c6e8e62d6b52a4f19f2f43b360bd09ef3130799b51f0fd0741b6b5c020a832a0000000000000"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x3, 0x6}, {0x0, 0x7}], r7}, 0x18, 0x1) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r15 = inotify_init() r16 = getegid() r17 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r17, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r20, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r21 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r21, 0xae01, 0x0) r22 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r23 = ioctl$KVM_CREATE_VM(r22, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r23, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r23, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r23, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r23, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r24 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r24, 0xae01, 0x0) r25 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r25, 0xae01, 0x0) r26 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r26, 0xae01, 0x0) r27 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r28 = ioctl$KVM_CREATE_VM(r27, 0xae01, 0x0) r29 = ioctl$KVM_CREATE_VCPU(r28, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r29, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r29, 0xae9a) ioctl$KVM_RUN(r29, 0xae80, 0x0) r30 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r30, 0xae01, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES16, @ANYPTR64, @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES16, @ANYRES16=r12, @ANYRESOCT=r25], @ANYRES32=r26, @ANYRESOCT=0x0, @ANYRES32=r29, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="c708ec139e297478cfab7f8ec2ba8cb0475c1fd7f76ec4be56d75eec10f92d325e71f76579ec8419e2a960140fb62b8e6ad5b4f23cfce3066ec1cf72c9448cf162b60180d95b7c95f708920a4c6b908f2636678705b4fe81811293ed9aaa642d834e31107b4688ae58886712ebd44791a2dad420b277fb92873ddc69998d2267ec08edea74d153b9efa7988f739355742a5f7226ea23e8d310f9f49c235d22c5a1b3569a478afdc7e6e808a0e1358b77ebae1e6de76506cbc17a232c93c627d0cab3a7a01552066fe59f31422fae079242117b92329fa2d2226deef3852ab35549c50172ccde", @ANYRESDEC=r18, @ANYBLOB="f1f805108409b946d0457052", @ANYRES64=r8, @ANYRESOCT=r30], @ANYRES32=r10], @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r13, @ANYRES32, @ANYRES32=r15, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32=r0, @ANYRES32=r19, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESOCT=r21, @ANYRESOCT=r18, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r17, @ANYRESOCT=0x0]], @ANYRES32=r11, @ANYRES32=r14, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r16, @ANYRESDEC=0x0, @ANYRES32=r20, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x201, 0x40000}, 0x0) write$P9_RGETATTR(r5, &(0x7f0000000140)={0xa0, 0x19, 0x1, {0xb0, {0x3, 0x0, 0x7}, 0x20, r7, r16, 0xbf0c, 0x3, 0x4, 0xec, 0x7f, 0x7, 0x80, 0xcf7, 0x82c, 0x7, 0x5, 0x1, 0x1, 0x0, 0x1f}}, 0xa0) r31 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r31, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1408.229600] JFS: discard option not supported on device [ 1408.239564] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1408.445550] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:33 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) tkill(r2, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r1) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r7, 0x40049409, r8) ioctl$KDGKBENT(r8, 0x4b46, &(0x7f0000000000)={0x3, 0x4, 0x3}) r9 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r9, 0xae9a) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f0000000140)={0xb3, "8bbee5cf0608afe864be63f7417702568e7c182014040fe7e710ad4fa314a10ef52bfde7c51db28fd834806c1061121c70c34b6831bf39155e8f193c8ba23a40ff79230130c5d2af214dd4769337dca9faebbbb31492636dca7d2a399bb2d23da34ded8b962fb877c92ef93f80944d11d09ec4d892ab8ff9a06a0299b31373a5e1677eaddd526b90e9f8ec03d6739c3dc0659a2cad13dbe50c5231cd75ef9844cf1f9d332324e8a742d3e5141501b2a0155a52"}) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:33 executing program 2: 14:18:33 executing program 5: 14:18:33 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:33 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb30daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:33 executing program 2: [ 1408.558237] audit: type=1804 audit(1575814713.919:743): pid=4484 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:33 executing program 5: [ 1408.746142] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:34 executing program 2: 14:18:34 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x2}}}}}}, 0x0) 14:18:34 executing program 5: [ 1408.855746] JFS: discard option not supported on device 14:18:34 executing program 2: 14:18:34 executing program 4: 14:18:34 executing program 5: [ 1408.896448] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:34 executing program 2: 14:18:34 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8}}}}}}, 0x0) 14:18:34 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1409.353465] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:34 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x200000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xfffffffffffffe0d) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x8b42c6d8b453db85, 0x10, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000380)) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) r5 = epoll_create1(0x0) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000080)={0x0, 0x0, 0x8001}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f00000000c0)) r6 = dup(r5) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x0, 0xfffffffffffffffd, 0x8}) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xf908, @mcast1, 0x7f}}}, 0x30) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000440)=""/6, 0x4000, 0x1000}, 0x18) mmap$xdp(&(0x7f00004f1000/0xb000)=nil, 0xb000, 0x4, 0x11, r7, 0x100000000) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x80800, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240), r9, 0x0, 0x0, 0x1}}, 0x20) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/\x0e\x9a\x00\x00 \x00\x00\x00X\xc1\x86a_cm\x00\x00\x00\x00\x00\x12\x10\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) r12 = socket(0xa, 0x3, 0x8) r13 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r15 = gettid() waitid(0x83b895581628fca4, r15, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r12, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r14, @ANYRESDEC=r15]], 0xfffffffffffffe56}}, 0x20004850) write$RDMA_USER_CM_CMD_SET_OPTION(r11, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000300), r14, 0x0, 0x0, 0x1}}, 0x20) r16 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r16, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240), r17, 0x0, 0x0, 0x1}}, 0x20) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='GPL#@\x00') r18 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r18, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r18, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240), r19, 0x0, 0x0, 0xfffffffffffffe32}}, 0x20) 14:18:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb31daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0x10, 0x100000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) 14:18:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x80002) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 14:18:34 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x543}}}}}}, 0x0) [ 1409.405823] JFS: discard option not supported on device [ 1409.411421] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:34 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1409.517718] audit: type=1400 audit(1575814714.869:744): avc: denied { map } for pid=4639 comm="syz-executor.4" path="socket:[286074]" dev="sockfs" ino=286074 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 [ 1409.586328] ptrace attach of "/root/syz-executor.5"[1503] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ     @ = [ 1409.693007] cgroup: fork rejected by pids controller in /syz4 14:18:35 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x608}}}}}}, 0x0) 14:18:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x80002) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000240)={0x1000, 0xdff, 0xae9, {0x77359400}, 0x6, 0x9}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) 14:18:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:35 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1409.991807] JFS: discard option not supported on device [ 1410.029608] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:35 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x689}}}}}}, 0x0) 14:18:35 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1410.232502] ptrace attach of "/root/syz-executor.4"[1414] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ !    \x0a       ÿ\x0d é\x0a ”5w  \x09 @ = [ 1410.293606] JFS: discard option not supported on device [ 1410.410141] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1410.478746] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb32daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1410.588838] JFS: discard option not supported on device [ 1410.616164] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:36 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x806}}}}}}, 0x0) 14:18:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$usbmon(&(0x7f0000000d40)='/dev/usbmon#\x00', 0x0, 0x80002) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000240)={0x1000, 0xdff, 0xae9, {0x77359400}, 0x6, 0x9}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) 14:18:36 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:36 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1410.960843] ptrace attach of "/root/syz-executor.4"[1414] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ !    \x0a       ÿ\x0d é\x0a ”5w  \x09 @ = [ 1411.016577] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:36 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0xe80}}}}}}, 0x0) [ 1411.338769] JFS: discard option not supported on device [ 1411.344602] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1411.349046] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:36 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:36 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1411.636251] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb33daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1411.778334] JFS: discard option not supported on device [ 1411.803089] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:37 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0x0, 0x9}, 0x18) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$RTC_WIE_ON(r7, 0x700f) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:37 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x3580}}}}}}, 0x0) 14:18:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:37 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x0, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:37 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x3f00}}}}}}, 0x0) [ 1412.133997] JFS: discard option not supported on device [ 1412.140132] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1412.154617] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:37 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x0, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb25daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:37 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x4305}}}}}}, 0x0) [ 1412.560568] JFS: discard option not supported on device [ 1412.567038] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:37 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x0, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1412.610942] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb34daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1412.789086] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1412.799419] JFS: discard option not supported on device [ 1412.806066] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1413.017703] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1413.213028] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0x0, 0x9}, 0x18) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$RTC_WIE_ON(r7, 0x700f) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:40 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x4788}}}}}}, 0x0) 14:18:40 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x0, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb25daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb35daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:40 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x4888}}}}}}, 0x0) [ 1415.097740] JFS: discard option not supported on device [ 1415.103183] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1415.107891] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1415.136013] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) 14:18:40 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x0, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:40 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x6488}}}}}}, 0x0) [ 1415.471891] JFS: discard option not supported on device [ 1415.478255] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) [ 1415.583369] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:43 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000140)=""/4096, 0x1000, 0x0, 0x9}, 0x18) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r2) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$RTC_WIE_ON(r7, 0x700f) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x9, 0x6, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:18:43 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x0, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:43 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x800e}}}}}}, 0x0) 14:18:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) 14:18:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb36daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb25daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:43 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0x100000098) [ 1418.121566] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:43 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8035}}}}}}, 0x0) 14:18:43 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1418.237487] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1418.316205] JFS: discard option not supported on device [ 1418.321681] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:43 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x0, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1418.524602] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:43 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8100}}}}}}, 0x0) 14:18:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb37daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1418.625004] JFS: discard option not supported on device [ 1418.660366] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1418.791819] JFS: discard option not supported on device [ 1418.798305] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1418.945353] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1418.993281] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb24daea0570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:46 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0x100000098) 14:18:46 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:46 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8847}}}}}}, 0x0) 14:18:46 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x0, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0270041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1421.162492] JFS: discard option not supported on device [ 1421.224036] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:46 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0x100000098) [ 1421.303544] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:46 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8848}}}}}}, 0x0) [ 1421.393270] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1421.432439] JFS: discard option not supported on device [ 1421.452702] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:46 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:47 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x0, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) [ 1421.847581] JFS: discard option not supported on device [ 1421.853040] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1421.878363] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1421.898058] JFS: discard option not supported on device 14:18:47 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8864}}}}}}, 0x0) [ 1421.919646] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) 14:18:47 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:47 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0370041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:47 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:47 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x8906}}}}}}, 0x0) 14:18:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) [ 1422.366644] JFS: discard option not supported on device [ 1422.372111] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1422.415564] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:48 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:48 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1422.842222] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:48 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1422.907731] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:48 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) fstat(0xffffffffffffffff, &(0x7f0000000080)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x10001, 0x0) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000240)={0x8, 0x6, 0xd406}) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x100) open_by_handle_at(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="0a0000000000000000dd855d3d1769c0"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) ioctl$VIDIOC_G_JPEGCOMP(r5, 0x808c563d, &(0x7f0000000100)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x19a2, @mcast1}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1422.981574] JFS: discard option not supported on device [ 1423.013596] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:48 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:48 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1423.118013] audit: type=1804 audit(1575814728.479:745): pid=8360 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:18:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0470041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1423.244042] JFS: discard option not supported on device 14:18:48 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) syz_emit_ethernet(0x66, &(0x7f00000000c0)=ANY=[@ANYBLOB="aabf13a39f38890b11bc010000aaaaaa0800b5aaaaaabb0805000000000000000000069078ac1414003443aad68d3134a9", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="1002000090780000040202046ceffe0ff989322c50585970f3464f7df6fe06e2d4c3d913125dcb87295504cb2a0e163adbf866f1cd050200"], 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, {0x5, 0x2, 0xff, 0x4, 0x9, 0x34}}, 0xa) [ 1423.347120] JFS: discard option not supported on device [ 1423.352935] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:48 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1423.481924] JFS: discard option not supported on device [ 1423.565075] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1423.634023] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:49 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:49 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="427c4d13bb8d7537529e7b081a42bf81c422be11b0cbcef6e3572542d9b2c885d6fa9e27d9780c6ccdd43d3338e0e5f997c47f92273d534b59fdc1a67126ec43cbbeffe1c1257a2546ab0bb843", 0x4d, 0xffffffffffffffc4}, {&(0x7f0000000380)="085ebb9643e97be8385d44ead553739f9cd8407d8a3fa242c024b47712ea58e1d8c3de4f6601f696f6115e4ee6e12989a292123758939ce1b5cb95b4c450e987107f768db23b4d", 0x47, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x721f53db}}, {@integrity='integrity'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@grpquota='grpquota'}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31, 0x64], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3c, 0x2e, 0x63, 0x34, 0x35, 0x32, 0x65], 0x2d, [0x33, 0x35, 0x30, 0x3f], 0x2d, [0x59, 0x35, 0xc4, 0x66], 0x2d, [0x34, 0x39, 0x30, 0x5d], 0x2d, [0x42, 0x60, 0x0, 0xbaae13b26f10550e, 0xe, 0x38, 0x66, 0x31]}}}, {@euid_eq={'euid'}}, {@audit='audit'}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:49 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1423.910783] FAULT_INJECTION: forcing a failure. [ 1423.910783] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.977108] JFS: discard option not supported on device [ 1424.025964] CPU: 0 PID: 8685 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1424.033857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1424.043262] Call Trace: [ 1424.045911] dump_stack+0x197/0x210 [ 1424.049759] should_fail.cold+0xa/0x1b [ 1424.050444] JFS: discard option not supported on device [ 1424.053709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1424.053739] ? lock_downgrade+0x880/0x880 [ 1424.053778] __should_failslab+0x121/0x190 [ 1424.073745] should_failslab+0x9/0x14 [ 1424.078020] __kmalloc+0x2e2/0x750 [ 1424.081611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1424.087174] ? do_handle_open+0x113/0x6e0 [ 1424.091356] do_handle_open+0x113/0x6e0 [ 1424.095366] ? vfs_dentry_acceptable+0x10/0x10 [ 1424.099985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1424.104763] ? do_syscall_64+0x26/0x620 [ 1424.108755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1424.114167] ? do_syscall_64+0x26/0x620 [ 1424.118203] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1424.123251] do_syscall_64+0xfd/0x620 [ 1424.127069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1424.132263] RIP: 0033:0x45a6f9 [ 1424.135457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1424.154456] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1424.162262] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1424.170063] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 14:18:49 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000380)=0x4) r4 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r4, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}}, 0x1c) listen(r4, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00008900000008004500004d0000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090780000"], 0x0) recvmmsg(r4, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000000040)}, 0x4}, {{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/190, 0xbe}, {&(0x7f00000001c0)=""/101, 0x65}], 0x2, &(0x7f0000000280)=""/243, 0xf3}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000013c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001440)=""/9, 0x9}, {&(0x7f0000001480)=""/252, 0xfc}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001600)=""/11, 0xb}, {&(0x7f0000001640)=""/216, 0xd8}], 0x5}, 0x401}, {{&(0x7f00000017c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/227, 0xe3}], 0x1}, 0x1}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001980)=""/205, 0xcd}], 0x1, &(0x7f0000001d40)=""/168, 0xa8}, 0x2}], 0x6, 0x264fe491b96a3926, 0x0) connect$vsock_dgram(r5, &(0x7f0000001d00)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000001ac0)={0x2, 'veth0_to_team\x00', {0x9}, 0x22}) [ 1424.177344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1424.184836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 [ 1424.192290] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 [ 1424.240494] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1424.245564] JFS: discard option not supported on device [ 1424.259484] audit: type=1804 audit(1575814729.619:746): pid=8729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:18:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1424.306565] audit: type=1804 audit(1575814729.649:747): pid=8729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1424.342164] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1424.358766] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:49 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000002240)='/dev/zero\x00', 0xff153911c069fa16, 0x0) syz_emit_ethernet(0x48, &(0x7f00000000c0)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @igmp={0x5, 0x1, 0x0, @broadcast, "8bfc8807c541fedfe7719a93f3deacd08e9243d0d9dcdc785c9a63cba7ee"}}}}}, 0x0) [ 1424.471738] audit: type=1804 audit(1575814729.649:748): pid=8729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:18:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0670041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:49 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:49 executing program 5 (fault-call:11 fault-nth:0): r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1424.524214] audit: type=1804 audit(1575814729.649:749): pid=8729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:18:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:50 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1424.643062] JFS: discard option not supported on device [ 1424.653950] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:50 executing program 4 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:50 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:50 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000000)=[{}, {}], 0x0, [{}]}, 0x88) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1424.985953] FAULT_INJECTION: forcing a failure. [ 1424.985953] name failslab, interval 1, probability 0, space 0, times 0 14:18:50 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e1d, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$TCXONC(r1, 0x540a, 0x7fffffff) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@builtin='builtin_trusted\x00') r5 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='&-%\x00', r4) r6 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r5, r6) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$TCSBRK(r2, 0x5409, 0x1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) io_setup(0x800, &(0x7f0000000100)) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaa5b3dd3f689aaaae60cee48a28ffa280abdc34238637d260000890000000800450c0027aadc91954f8b94d7e03ffcf678198fde835d7f1aced3fe63ccdf8674f66063aa6d760b1e8b5ab6084f5b8293669e6bd69da83b95ad9c2e8527d92ff208f702dee48cac406b4771df709e913a415751e66f08c2052a", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="50b0000090780000"], 0x0) setxattr$security_selinux(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:iptables_initrc_exec_t:s0\x00', 0x2c, 0x2) [ 1425.034065] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1425.069193] CPU: 0 PID: 9057 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1425.077128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.086523] Call Trace: [ 1425.086566] dump_stack+0x197/0x210 [ 1425.086598] should_fail.cold+0xa/0x1b [ 1425.086624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.103001] ? lock_downgrade+0x880/0x880 [ 1425.103039] __should_failslab+0x121/0x190 [ 1425.111408] should_failslab+0x9/0x14 [ 1425.111433] kmem_cache_alloc+0x2ae/0x700 [ 1425.119601] getname_kernel+0x53/0x370 [ 1425.123553] do_file_open_root+0x176/0x3a0 [ 1425.127931] ? do_filp_open+0x280/0x280 [ 1425.131942] ? __lock_is_held+0xb6/0x140 [ 1425.137570] ? debug_check_no_obj_freed+0x200/0x464 [ 1425.142631] ? __alloc_fd+0x44d/0x560 [ 1425.146482] ? find_held_lock+0x35/0x130 [ 1425.150574] ? __alloc_fd+0x44d/0x560 [ 1425.154421] ? lock_downgrade+0x880/0x880 [ 1425.158597] ? __lock_is_held+0xb6/0x140 [ 1425.162712] file_open_root+0x2e0/0x3c0 [ 1425.166737] ? dentry_open+0x1d0/0x1d0 [ 1425.170686] do_handle_open+0x3a9/0x6e0 [ 1425.170707] ? vfs_dentry_acceptable+0x10/0x10 [ 1425.179302] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1425.184124] ? do_syscall_64+0x26/0x620 [ 1425.188150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.193568] ? do_syscall_64+0x26/0x620 [ 1425.197606] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1425.202653] do_syscall_64+0xfd/0x620 [ 1425.206514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.211754] RIP: 0033:0x45a6f9 [ 1425.214990] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1425.234061] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1425.243044] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1425.250431] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1425.257744] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:18:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) [ 1425.265055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 [ 1425.272354] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 [ 1425.282025] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) 14:18:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0770041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:50 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1425.351857] audit: type=1804 audit(1575814730.709:750): pid=9067 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:18:50 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000080)) [ 1425.500516] JFS: discard option not supported on device [ 1425.526663] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:51 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x33) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x4e24, @local}}) listen(r0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00008900000008004500fe6900d555577f7a7627eb321100000000069078ac140bf23ec68ee78e7e8f7ab063f5c3d5e04ea2695088aa9544093e381b01ff00640003a2d2145804ca9a1316598a425f0c9ee83f33"], 0x0) [ 1425.702070] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:51 executing program 4 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:51 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:51 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x11, r1, 0x0, 0x8000000000000007) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) write(r1, &(0x7f0000000040)="e0", 0x100000098) [ 1425.865251] FAULT_INJECTION: forcing a failure. [ 1425.865251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1425.877144] CPU: 1 PID: 9208 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1425.877160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.877164] Call Trace: [ 1425.877198] dump_stack+0x197/0x210 [ 1425.877224] should_fail.cold+0xa/0x1b [ 1425.877244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.877262] ? debug_smp_processor_id+0x1c/0x20 [ 1425.877282] ? perf_trace_lock+0xeb/0x510 [ 1425.877295] ? mark_held_locks+0x100/0x100 [ 1425.877322] __alloc_pages_nodemask+0x1ee/0x750 [ 1425.877337] ? is_bpf_text_address+0xac/0x170 [ 1425.877357] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1425.877371] ? find_held_lock+0x35/0x130 [ 1425.877412] cache_grow_begin+0x91/0x8c0 [ 1425.877429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1425.877449] ? check_preemption_disabled+0x48/0x290 [ 1425.959235] kmem_cache_alloc+0x63b/0x700 [ 1425.963436] getname_kernel+0x53/0x370 [ 1425.967364] do_file_open_root+0x176/0x3a0 [ 1425.971652] ? do_filp_open+0x280/0x280 [ 1425.975698] ? __lock_is_held+0xb6/0x140 [ 1425.979809] ? debug_check_no_obj_freed+0x200/0x464 [ 1425.984887] ? __alloc_fd+0x44d/0x560 [ 1425.988731] ? find_held_lock+0x35/0x130 [ 1425.992845] ? __alloc_fd+0x44d/0x560 [ 1425.996690] ? lock_downgrade+0x880/0x880 [ 1425.996707] ? __lock_is_held+0xb6/0x140 [ 1425.996730] file_open_root+0x2e0/0x3c0 [ 1425.996754] ? dentry_open+0x1d0/0x1d0 [ 1426.012912] do_handle_open+0x3a9/0x6e0 [ 1426.016931] ? vfs_dentry_acceptable+0x10/0x10 [ 1426.021563] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1426.026362] ? do_syscall_64+0x26/0x620 [ 1426.026382] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.026395] ? do_syscall_64+0x26/0x620 [ 1426.026414] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1426.026430] do_syscall_64+0xfd/0x620 [ 1426.026447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.026459] RIP: 0033:0x45a6f9 [ 1426.026472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.026480] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1426.026494] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1426.026501] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1426.026508] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1426.026521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 14:18:51 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="3c02000090780000"], 0x0) 14:18:51 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpgrp(r1) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) [ 1426.039866] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 [ 1426.123418] audit: type=1804 audit(1575814731.439:751): pid=9208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1426.255968] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:51 executing program 4 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1426.403634] JFS: discard option not supported on device [ 1426.435814] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0870041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1426.496015] FAULT_INJECTION: forcing a failure. [ 1426.496015] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.509365] CPU: 0 PID: 9638 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1426.517393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1426.526978] Call Trace: [ 1426.529665] dump_stack+0x197/0x210 [ 1426.533606] should_fail.cold+0xa/0x1b [ 1426.537758] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:18:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1426.543135] ? lock_downgrade+0x880/0x880 [ 1426.547506] __should_failslab+0x121/0x190 [ 1426.552013] should_failslab+0x9/0x14 [ 1426.556180] kmem_cache_alloc+0x2ae/0x700 [ 1426.560391] ? cache_grow_end+0xa4/0x190 [ 1426.564522] __alloc_file+0x27/0x330 [ 1426.568368] alloc_empty_file+0x72/0x170 [ 1426.572641] path_openat+0xef/0x45e0 [ 1426.576417] ? lock_downgrade+0x880/0x880 [ 1426.580770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1426.586353] ? check_preemption_disabled+0x48/0x290 [ 1426.591419] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1426.596105] ? kmem_cache_alloc+0x32a/0x700 [ 1426.600483] ? memcpy+0x46/0x50 [ 1426.603822] do_file_open_root+0x290/0x3a0 [ 1426.608281] ? do_filp_open+0x280/0x280 [ 1426.612593] ? __lock_is_held+0xb6/0x140 [ 1426.617021] ? __alloc_fd+0x44d/0x560 [ 1426.620876] ? find_held_lock+0x35/0x130 [ 1426.624967] ? __alloc_fd+0x44d/0x560 [ 1426.628881] ? lock_downgrade+0x880/0x880 [ 1426.633081] ? __lock_is_held+0xb6/0x140 [ 1426.637388] file_open_root+0x2e0/0x3c0 [ 1426.641409] ? dentry_open+0x1d0/0x1d0 [ 1426.645341] do_handle_open+0x3a9/0x6e0 [ 1426.649357] ? vfs_dentry_acceptable+0x10/0x10 [ 1426.653987] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1426.658812] ? do_syscall_64+0x26/0x620 [ 1426.663409] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.668848] ? do_syscall_64+0x26/0x620 [ 1426.672875] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1426.677813] do_syscall_64+0xfd/0x620 [ 1426.681620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.686848] RIP: 0033:0x45a6f9 [ 1426.690043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.709340] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1426.717366] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1426.724710] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1426.732283] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1426.739719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 14:18:52 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x105000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000001c0)={'veth0_to_team\x00'}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=""/71, 0x4000, 0x0, 0x1}, 0x18) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 14:18:52 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090447802b5a40ee44e70cb5e2b45f7795897de0b9b130cdc11abd7363e0c06e19eb5be195f23a9975debc0d7cae8e8e249d080a842f45b372ff7"], 0x0) socket$kcm(0x29, 0x3, 0x0) 14:18:52 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1426.747021] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 14:18:52 executing program 4 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1426.911759] JFS: discard option not supported on device 14:18:52 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x2, 0x4, 0x8}, 0x8) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:52 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3, 0x100, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1426.964712] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1427.039682] FAULT_INJECTION: forcing a failure. [ 1427.039682] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.073921] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1427.095212] CPU: 1 PID: 9658 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1427.102993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.112451] Call Trace: [ 1427.115088] dump_stack+0x197/0x210 [ 1427.118760] should_fail.cold+0xa/0x1b [ 1427.122688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1427.127822] ? lock_downgrade+0x880/0x880 [ 1427.132012] __should_failslab+0x121/0x190 [ 1427.136278] should_failslab+0x9/0x14 [ 1427.140103] kmem_cache_alloc+0x2ae/0x700 [ 1427.144253] ? kasan_check_write+0x14/0x20 [ 1427.148501] ? do_raw_read_unlock+0x3f/0x70 [ 1427.152818] ? _raw_read_unlock+0x2d/0x50 [ 1427.156969] ima_d_path+0x52/0x1ee [ 1427.160513] ? integrity_inode_get+0x2a/0x260 [ 1427.165005] process_measurement+0xb17/0x1560 [ 1427.169511] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1427.174659] ? ima_add_template_entry.cold+0x48/0x48 [ 1427.180021] ? mark_held_locks+0x100/0x100 [ 1427.184368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.190008] ? SOFTIRQ_verbose+0x10/0x10 [ 1427.197748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.204786] ? selinux_task_getsecid+0x16f/0x2d0 [ 1427.209561] ? find_held_lock+0x35/0x130 [ 1427.213704] ? selinux_task_getsecid+0x16f/0x2d0 [ 1427.218897] ? lock_downgrade+0x880/0x880 [ 1427.223046] ? kasan_check_read+0x11/0x20 [ 1427.227195] ? selinux_task_getsecid+0x196/0x2d0 [ 1427.231962] ima_file_check+0xc5/0x110 [ 1427.235847] ? process_measurement+0x1560/0x1560 [ 1427.240599] ? inode_permission+0xb4/0x560 [ 1427.244920] path_openat+0x1130/0x45e0 [ 1427.248806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.254346] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1427.259098] ? kmem_cache_alloc+0x32a/0x700 [ 1427.263508] ? memcpy+0x46/0x50 [ 1427.266884] do_file_open_root+0x290/0x3a0 [ 1427.271203] ? do_filp_open+0x280/0x280 [ 1427.275289] ? __lock_is_held+0xb6/0x140 [ 1427.279376] ? __alloc_fd+0x44d/0x560 [ 1427.283177] ? find_held_lock+0x35/0x130 [ 1427.287371] ? __alloc_fd+0x44d/0x560 [ 1427.291194] ? lock_downgrade+0x880/0x880 [ 1427.295450] ? __lock_is_held+0xb6/0x140 [ 1427.299567] file_open_root+0x2e0/0x3c0 [ 1427.303759] ? dentry_open+0x1d0/0x1d0 [ 1427.308208] do_handle_open+0x3a9/0x6e0 [ 1427.312224] ? vfs_dentry_acceptable+0x10/0x10 [ 1427.316819] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1427.321938] ? do_syscall_64+0x26/0x620 [ 1427.325949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.331633] ? do_syscall_64+0x26/0x620 [ 1427.335662] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1427.340665] do_syscall_64+0xfd/0x620 [ 1427.344575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.350021] RIP: 0033:0x45a6f9 [ 1427.353769] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1427.373092] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1427.380927] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1427.388510] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1427.396746] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1427.404829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 [ 1427.412113] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 14:18:52 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x31], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:52 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sync_file_range(r2, 0x2, 0x4a2, 0x2) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1427.930622] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1427.946521] JFS: discard option not supported on device [ 1427.962756] audit: type=1804 audit(1575814733.319:752): pid=9658 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1427.990103] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:53 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r2, 0x40044103, &(0x7f0000000000)=0xd3) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:53 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@can={0xc, {{0x1, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "782245535ce2d4fa"}}}}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r3, 0x40049409, r4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x4, @mcast1, 0xf7a0}}, [0x3f, 0x3, 0x8, 0x8001, 0xff0, 0xeaf, 0x7ff, 0xa87, 0x1, 0x8, 0x1, 0x200, 0x5, 0xfffffffffffffff8]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r5, 0xef8, 0x7, [0x49fc, 0x7c, 0x3f, 0x4711, 0x6, 0x3, 0x9]}, 0x16) 14:18:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:53 executing program 4 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0970041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:53 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:53 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1428.197420] FAULT_INJECTION: forcing a failure. [ 1428.197420] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.239971] CPU: 1 PID: 9817 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1428.247782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.247790] Call Trace: [ 1428.247824] dump_stack+0x197/0x210 [ 1428.247849] should_fail.cold+0xa/0x1b [ 1428.247870] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1428.247890] ? lock_downgrade+0x880/0x880 [ 1428.247920] __should_failslab+0x121/0x190 [ 1428.280996] should_failslab+0x9/0x14 [ 1428.284825] kmem_cache_alloc+0x2ae/0x700 14:18:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1428.284840] ? kasan_check_write+0x14/0x20 [ 1428.284854] ? do_raw_read_unlock+0x3f/0x70 [ 1428.284870] ? _raw_read_unlock+0x2d/0x50 [ 1428.284892] ima_d_path+0x52/0x1ee [ 1428.284905] ? integrity_inode_get+0x2a/0x260 [ 1428.284920] process_measurement+0xb17/0x1560 [ 1428.284944] ? ima_add_template_entry.cold+0x48/0x48 [ 1428.284959] ? mark_held_locks+0x100/0x100 [ 1428.284980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.329835] ? SOFTIRQ_verbose+0x10/0x10 [ 1428.333953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.339572] ? dquot_file_open+0x77/0xb0 [ 1428.343679] ? selinux_task_getsecid+0x16f/0x2d0 [ 1428.348495] ? find_held_lock+0x35/0x130 [ 1428.352595] ? selinux_task_getsecid+0x16f/0x2d0 [ 1428.357494] ? lock_downgrade+0x880/0x880 [ 1428.362206] ? kasan_check_read+0x11/0x20 [ 1428.366424] ? selinux_task_getsecid+0x196/0x2d0 [ 1428.371246] ima_file_check+0xc5/0x110 [ 1428.375199] ? process_measurement+0x1560/0x1560 [ 1428.379991] ? inode_permission+0xb4/0x560 [ 1428.384325] path_openat+0x1130/0x45e0 14:18:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:53 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1428.388297] ? lock_downgrade+0x880/0x880 [ 1428.392488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.398085] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1428.402793] ? kmem_cache_alloc+0x32a/0x700 [ 1428.407160] ? memcpy+0x46/0x50 [ 1428.410656] do_file_open_root+0x290/0x3a0 [ 1428.414910] ? do_filp_open+0x280/0x280 [ 1428.418910] ? __lock_is_held+0xb6/0x140 [ 1428.418939] ? __alloc_fd+0x44d/0x560 [ 1428.418961] ? find_held_lock+0x35/0x130 [ 1428.430899] ? __alloc_fd+0x44d/0x560 [ 1428.434759] ? lock_downgrade+0x880/0x880 [ 1428.438937] ? __lock_is_held+0xb6/0x140 [ 1428.443039] file_open_root+0x2e0/0x3c0 [ 1428.447167] ? dentry_open+0x1d0/0x1d0 [ 1428.451110] do_handle_open+0x3a9/0x6e0 [ 1428.455124] ? vfs_dentry_acceptable+0x10/0x10 [ 1428.459736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1428.464521] ? do_syscall_64+0x26/0x620 [ 1428.468538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.474063] ? do_syscall_64+0x26/0x620 [ 1428.478082] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1428.483064] do_syscall_64+0xfd/0x620 [ 1428.486961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.492194] RIP: 0033:0x45a6f9 [ 1428.495427] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.514355] RSP: 002b:00007f2a5dbaec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1428.522166] RAX: ffffffffffffffda RBX: 00007f2a5dbaec90 RCX: 000000000045a6f9 [ 1428.530432] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1428.537742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1428.545251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5dbaf6d4 [ 1428.552560] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000006 14:18:54 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2b) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1428.694471] JFS: discard option not supported on device [ 1428.718326] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1428.762770] audit: type=1804 audit(1575814734.119:753): pid=9817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1428.850844] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:54 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80c00, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000180)={0x0, &(0x7f0000000040)=""/86, &(0x7f0000000140)}) 14:18:54 executing program 4 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:54 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x0, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1429.174531] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1429.237388] FAULT_INJECTION: forcing a failure. [ 1429.237388] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1429.249316] CPU: 0 PID: 9957 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1429.257048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.266937] Call Trace: [ 1429.269576] dump_stack+0x197/0x210 [ 1429.273266] should_fail.cold+0xa/0x1b [ 1429.277199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1429.282377] ? mark_held_locks+0x100/0x100 [ 1429.286759] __alloc_pages_nodemask+0x1ee/0x750 [ 1429.291477] ? mark_held_locks+0x100/0x100 [ 1429.295755] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1429.300913] cache_grow_begin+0x91/0x8c0 [ 1429.305020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1429.310608] ? check_preemption_disabled+0x48/0x290 [ 1429.315662] kmem_cache_alloc+0x63b/0x700 [ 1429.319939] ? kasan_check_write+0x14/0x20 [ 1429.324243] ima_d_path+0x52/0x1ee [ 1429.327846] ? integrity_inode_get+0x2a/0x260 [ 1429.332387] process_measurement+0xb17/0x1560 [ 1429.336944] ? ima_add_template_entry.cold+0x48/0x48 [ 1429.342113] ? mark_held_locks+0x100/0x100 [ 1429.346437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.352119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.357698] ? generic_file_open+0x8d/0xb0 [ 1429.361986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.367650] ? dquot_file_open+0x77/0xb0 [ 1429.371858] ? selinux_task_getsecid+0x16f/0x2d0 [ 1429.376655] ? find_held_lock+0x35/0x130 [ 1429.380777] ? selinux_task_getsecid+0x16f/0x2d0 [ 1429.388987] ? lock_downgrade+0x880/0x880 [ 1429.393180] ? kasan_check_read+0x11/0x20 [ 1429.397374] ? selinux_task_getsecid+0x196/0x2d0 [ 1429.402179] ima_file_check+0xc5/0x110 [ 1429.406108] ? process_measurement+0x1560/0x1560 [ 1429.410901] ? inode_permission+0xb4/0x560 [ 1429.415184] path_openat+0x1130/0x45e0 [ 1429.419115] ? lock_downgrade+0x880/0x880 [ 1429.423445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.429031] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1429.433718] ? kmem_cache_alloc+0x32a/0x700 [ 1429.438073] ? memcpy+0x46/0x50 [ 1429.441372] do_file_open_root+0x290/0x3a0 [ 1429.445615] ? do_filp_open+0x280/0x280 [ 1429.449777] ? __lock_is_held+0xb6/0x140 [ 1429.453870] ? __alloc_fd+0x44d/0x560 [ 1429.457681] ? find_held_lock+0x35/0x130 [ 1429.461762] ? __alloc_fd+0x44d/0x560 [ 1429.465834] ? lock_downgrade+0x880/0x880 [ 1429.470154] ? __lock_is_held+0xb6/0x140 [ 1429.474216] file_open_root+0x2e0/0x3c0 [ 1429.478190] ? dentry_open+0x1d0/0x1d0 [ 1429.482108] do_handle_open+0x3a9/0x6e0 [ 1429.486101] ? vfs_dentry_acceptable+0x10/0x10 [ 1429.490682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1429.495444] ? do_syscall_64+0x26/0x620 [ 1429.499507] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.504889] ? do_syscall_64+0x26/0x620 [ 1429.508869] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1429.513819] do_syscall_64+0xfd/0x620 [ 1429.517626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.522914] RIP: 0033:0x45a6f9 [ 1429.526193] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1429.545127] RSP: 002b:00007f2a5db8dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1429.552843] RAX: ffffffffffffffda RBX: 00007f2a5db8dc90 RCX: 000000000045a6f9 [ 1429.560112] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1429.567573] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1429.574926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5db8e6d4 14:18:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0a70041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:54 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) getsockopt$inet_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1429.582342] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000005 14:18:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1429.808415] audit: type=1804 audit(1575814735.169:754): pid=9957 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1429.814486] JFS: discard option not supported on device 14:18:55 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_GET_KEEPCAPS(0x7) rt_sigsuspend(&(0x7f0000000040)={0x7}, 0x8) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) memfd_create(&(0x7f0000000000)='em0{@\x00', 0x7) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:55 executing program 4 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1429.895472] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1429.931449] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:55 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e28, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x430000, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x20c, 0x0, 0x0, r6}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000040)={r6, @in={{0x2, 0x4e22}}, 0x400}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r6, &(0x7f0000000080)=0x4) 14:18:55 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x0, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1430.188170] FAULT_INJECTION: forcing a failure. [ 1430.188170] name failslab, interval 1, probability 0, space 0, times 0 14:18:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1430.361835] CPU: 0 PID: 10096 Comm: syz-executor.4 Not tainted 4.19.88-syzkaller #0 [ 1430.369701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.379091] Call Trace: [ 1430.381733] dump_stack+0x197/0x210 [ 1430.387841] should_fail.cold+0xa/0x1b [ 1430.393185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1430.399472] ? kmem_cache_free+0x86/0x260 [ 1430.399501] __should_failslab+0x121/0x190 [ 1430.399525] should_failslab+0x9/0x14 [ 1430.411881] __kmalloc+0x2e2/0x750 [ 1430.411901] ? debug_check_no_obj_freed+0x200/0x464 [ 1430.411923] ? ima_alloc_init_template+0x65/0x3b0 [ 1430.411941] ima_alloc_init_template+0x65/0x3b0 [ 1430.430398] ima_add_violation+0x113/0x1f0 [ 1430.434673] ? ima_store_template+0x2a0/0x2a0 [ 1430.439610] ? ima_d_path+0x119/0x1ee [ 1430.439631] ? strlcpy+0x40/0x80 [ 1430.439645] ? ima_d_path+0xbf/0x1ee [ 1430.439662] process_measurement+0xb3e/0x1560 [ 1430.439688] ? ima_add_template_entry.cold+0x48/0x48 [ 1430.460563] ? mark_held_locks+0x100/0x100 [ 1430.460579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.460596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.476166] ? generic_file_open+0x8d/0xb0 [ 1430.476184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.476198] ? dquot_file_open+0x77/0xb0 [ 1430.476216] ? selinux_task_getsecid+0x16f/0x2d0 [ 1430.476236] ? find_held_lock+0x35/0x130 [ 1430.499465] ? selinux_task_getsecid+0x16f/0x2d0 [ 1430.504281] ? lock_downgrade+0x880/0x880 [ 1430.508498] ? kasan_check_read+0x11/0x20 [ 1430.512801] ? selinux_task_getsecid+0x196/0x2d0 [ 1430.517603] ima_file_check+0xc5/0x110 [ 1430.521652] ? process_measurement+0x1560/0x1560 [ 1430.526462] ? inode_permission+0xb4/0x560 [ 1430.530745] path_openat+0x1130/0x45e0 [ 1430.534668] ? lock_downgrade+0x880/0x880 [ 1430.538859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.544468] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1430.549172] ? kmem_cache_alloc+0x32a/0x700 [ 1430.553734] ? memcpy+0x46/0x50 [ 1430.557172] do_file_open_root+0x290/0x3a0 [ 1430.561442] ? do_filp_open+0x280/0x280 [ 1430.565442] ? __lock_is_held+0xb6/0x140 [ 1430.569819] ? __alloc_fd+0x44d/0x560 [ 1430.573677] ? find_held_lock+0x35/0x130 [ 1430.577976] ? __alloc_fd+0x44d/0x560 [ 1430.581908] ? lock_downgrade+0x880/0x880 [ 1430.586100] ? __lock_is_held+0xb6/0x140 [ 1430.590222] file_open_root+0x2e0/0x3c0 [ 1430.594244] ? dentry_open+0x1d0/0x1d0 [ 1430.598182] do_handle_open+0x3a9/0x6e0 [ 1430.602198] ? vfs_dentry_acceptable+0x10/0x10 [ 1430.606917] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1430.611733] ? do_syscall_64+0x26/0x620 [ 1430.615753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.621209] ? do_syscall_64+0x26/0x620 [ 1430.625235] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1430.630330] do_syscall_64+0xfd/0x620 [ 1430.634451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.639942] RIP: 0033:0x45a6f9 [ 1430.643253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1430.662530] RSP: 002b:00007f2a5db6cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1430.670726] RAX: ffffffffffffffda RBX: 00007f2a5db6cc90 RCX: 000000000045a6f9 [ 1430.678139] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1430.685800] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1430.693307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a5db6d6d4 [ 1430.701289] R13: 00000000004c7c54 R14: 00000000004dece8 R15: 0000000000000004 14:18:56 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8e6, 0x3}, {0x0, 0x2}]}, 0x14, 0x1) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:56 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) listen(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450014bb00004e20000004000000024e98a2c0724a400000", @ANYRES32=0x42424242, @ANYRES16=0x0, @ANYBLOB="5002000090780000"], 0x0) [ 1430.741732] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1430.751056] JFS: discard option not supported on device [ 1430.779321] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea1070041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:56 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x31, 0x0, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:56 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0xfffffffffffffffc, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1431.111688] audit: type=1804 audit(1575814736.469:755): pid=10096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=0 14:18:56 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000040)={0x6, 0x3, 0x0, 0x80000000, 0x6}) [ 1431.252992] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1431.336749] JFS: discard option not supported on device [ 1431.342723] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1431.563814] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:57 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:57 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="38000000000000fcdad02500000000de13c35b8f1d16ec7b", @ANYRES32=0x0, @ANYBLOB="0e00000000420000080011000500000008002000420c000008001300", @ANYRES32=r0], 0x38}}, 0x0) r2 = accept(r1, &(0x7f0000000140)=@generic, &(0x7f00000001c0)=0x80) getsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000100)=""/77}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000003c0)={r4, 0x6418dfb3f257fc9a}) tkill(0x0, 0x3f) ptrace$cont(0x18, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_getattr(r5, &(0x7f0000000040)={0x30}, 0x30, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r9, 0xae9a) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r6, r9, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000280)="b9a0020000b8bf9103f7ba7d5d18050f30660f3881200f35c4c28d47b3cc760000650f015f00660f38808a00600000c4c1cdf4b2fc3f927d66baf80cb8b8454e82ef66bafc0c66b8d84766efb8010000000f01d966bad004ed", 0x59}], 0x1, 0x2, &(0x7f00000003c0), 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r6, 0x4) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:18:57 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [{[{0x9100, 0x1, 0x1, 0x4}], {0x8100, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea2570041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1431.715797] audit: type=1804 audit(1575814737.079:756): pid=10657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1431.759804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10655 comm=syz-executor.5 14:18:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1431.848465] JFS: discard option not supported on device [ 1431.905843] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:57 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x20010, r2, 0xe823e000) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a14000001000700007147d481f9ff043d8266d3fa4e07a7cba4ac9305d74ce4f2404a"], 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r5) getsockopt$nfc_llcp(r5, 0x118, 0x0, &(0x7f0000000000)=""/56, 0x38) r6 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r6) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3f) ptrace$cont(0x18, r7, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0xd0000, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000240)={[], 0x0, 0xfffffffd, 0x2a, 0x1fffffffe0, 0xf6, r8}) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) [ 1431.945170] audit: type=1804 audit(1575814737.299:757): pid=10864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:57 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x3f, 0x0, 0x2019, 0x200, 0x401, {0x7, 0x81}, 0x1}) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1432.070503] audit: type=1804 audit(1575814737.419:758): pid=10864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:57 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1432.201311] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:57 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [{[], {0x8100, 0x3, 0x0, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x73, 0x0, @dev={0xac, 0x14, 0x14, 0xff}, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x9, 0xf989, "171cfe5af5"}]}}, {"b78c80b4a2e7c48b84fc909ccd050f02c02bf9c37b510af82e749c3dfd708cbb7c84a06cb7412b6369f92bd38875a3fe5225728d98b719d82fc683ef1ea798fe2575d9517041809eaba64034651e0b15623f30633dce6425d58152fd8bc01282475d0c60fca57bf4"}}}}}}, 0x0) 14:18:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:18:57 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200040) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) [ 1432.469660] audit: type=1804 audit(1575814737.829:759): pid=11101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4f0000000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1432.612747] audit: type=1804 audit(1575814737.919:760): pid=11183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1432.749723] JFS: discard option not supported on device [ 1432.764452] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1432.783737] audit: type=1804 audit(1575814738.139:761): pid=11312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 [ 1432.823316] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1432.832456] audit: type=1804 audit(1575814738.189:762): pid=11312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/" dev="sda1" ino=24 res=1 14:18:58 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) tkill(r3, 0x10) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$caif_seqpacket(0x25, 0x5, 0x3) getsockopt$sock_buf(r4, 0x1, 0x3d, &(0x7f0000000000)=""/73, &(0x7f0000000080)=0x49) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:58 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x2f2, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:58 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f0100000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea3870041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:58 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x4) 14:18:58 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xf1, &(0x7f0000000040)={@random="66757db24d17", @random="1f85e5635397", [], {@ipx={0x8137, {0xffff, 0xe3, 0x26, 0x4, {@current, @random="df85e5fbf84a", 0x2}, {@broadcast, @random="5986a7892296", 0x3}, "1934b4e9f5e568375a6ef6659cbffc143690024e55563f03abb6c1e089547a416289809c05857315721287279aa9666e2da599536e213ab7bc496956dc9f7b1d35bd60520804692586cdd0fa18194b5ce79e99e4020d457c3e10d66cf8c7bdefbe53cb11c678fdd844e0cb6c68d675bea7255359661b24652647be41af706897f86de99d429aeb66b8a86083c2cbfaafe41d47d27f81f88badd110042e6ea50b3eef8270b6251dc41018eff3efb5617062a6d7af0c62a78977b60a23bb5450a4609429cac1"}}}}, &(0x7f0000000140)={0x1, 0x1, [0xe5b, 0x57f, 0xbf0, 0xcd5]}) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5102000090780000"], 0x0) 14:18:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="800100000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(0xffffffffffffffff, &(0x7f0000000040)="e0", 0x100000098) 14:18:58 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000040)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1433.389435] JFS: discard option not supported on device [ 1433.408738] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1433.451689] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, 0x0, 0x0) 14:18:59 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="f40200000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:59 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="500200008d780000"], 0x0) 14:18:59 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4202000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1433.758945] JFS: discard option not supported on device [ 1433.785874] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1434.020114] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, 0x0, 0x0) 14:18:59 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:18:59 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@remote, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:18:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="800400000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea050a041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:59 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000000)=""/111, 0x6f, 0xfffc, 0x101, 0x2, 0xd7}, 0x120) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, 0x0, 0x0) [ 1434.194134] JFS: discard option not supported on device [ 1434.220887] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:18:59 executing program 5: r0 = getpgrp(0xffffffffffffffff) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$cont(0x20, r0, 0x5, 0x865d) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="a12900000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:18:59 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r1) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) r2 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r2, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0aff03000000000000"], 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r3, 0x40049409, r4) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1434.440972] EXT4-fs (sda1): re-mounted. Opts: (null) 14:18:59 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ptrace$cont(0x18, r1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xf6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:18:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040), 0x0) 14:18:59 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x30], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1434.535261] audit: type=1804 audit(1575814739.879:763): pid=11927 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1434.619804] audit: type=1804 audit(1575814739.919:764): pid=11927 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:19:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="120000200100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040), 0x0) [ 1434.762395] audit: type=1804 audit(1575814739.939:765): pid=11927 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:19:00 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @remote}, {0x6, @remote}, 0xd, {0x2, 0x4e22, @remote}, 'ip6gretap0\x00'}) r2 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1434.926761] JFS: discard option not supported on device [ 1434.976185] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1434.982458] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1435.020617] audit: type=1804 audit(1575814740.379:766): pid=12053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1435.130946] audit: type=1804 audit(1575814740.409:767): pid=12053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:19:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0523041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040), 0x0) 14:19:00 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x0, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:19:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="5106ed5d0100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:00 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) socket(0x11, 0x1, 0x99) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, &(0x7f0000000080)="024892c0afe9c883a6e52fad788ebb6173f9ba460d2a0b6663b02034a5088c1c9cde2bbc8fc6e1218515fe1fb8b33caa829eeee6821795fdae6766dea0ddf27189d075070d3d22eb737a425186f64376663613060b917479f1135d25c5abc2402d81e8889c637309bb035d10e8d3ff566f426681fc080844b691c6a40a1f6b2a97144b17e08746caf6b0c307a5d08a9aecf21794c61a0f136007b15c47fb3df2233cf7e71389cf22cc537a94f16b81e82a", 0xb1, 0x80, &(0x7f0000000140)={0x2, 0x4e23}, 0x10) 14:19:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0770041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1435.448316] JFS: discard option not supported on device 14:19:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0200000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1435.491427] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1435.520901] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:01 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x0, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1435.624574] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:01 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00008900d4b464b099ca58da08bfd7f06ecb0000080045000028000000000006f4b62240674ee39a01b04b6372c757a2ed68206d", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090780000"], 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x0, 0x1, {0x0, 0x3, 0xffff, 0x0, 0x5}}) 14:19:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0770041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1435.813823] audit: type=1804 audit(1575814741.169:768): pid=12392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1435.839153] JFS: discard option not supported on device [ 1435.855433] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:19:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0300000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:01 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x3035321dd6724939, &(0x7f0000000080)=0x8001, 0x4) [ 1436.097711] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0525041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:01 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x24, 0x0, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:19:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0400000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0770041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:01 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090780000a21672513cefdc3f154eca64a08b503b9c516423bda81284e077da767ba41487fb9caa60a05dd310cafc932691aca0f2b9a3d741654e6dfe9fff02934ffed344ae7163237548d530766b67c0c9873d28b2b4c78c0b1f0c48d7422cd19d5301cdaf7d9d1fe69b160215de026532c565d90259308b026e1a80a7379c07df3cac8dec06af64ace3b641df5876224703ef1371c85c7994b98d8a"], 0x0) [ 1436.305937] JFS: discard option not supported on device [ 1436.311400] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1436.418760] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:01 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x0, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1436.470576] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0500000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:02 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x6e20, 0x5, @empty, 0x1}, 0x1c) listen(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_emit_ethernet(0x8, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRES64=r0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64], @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES64=r1], @ANYRES32, @ANYRES32=r1, @ANYRESDEC=r2, @ANYBLOB="6d09570bba19cee2a16a1d4b9bc6fd54d26dd02587f18fa14c6b97646b594c8523ddc9efc75c5d033fa0be381d6856a1e4b27957ca8e698dc91f417cb0ddcddfbd4a915b2e7db3df549f4c06b6407643ec2825044f662d4fbf148b6df19e31d5671c6125606dd01bc7b23c743fb9018abd3515ce9c88b5c1e45ac2f9e2a4f85417be1fbcb1b59d38137158c0d97e52fadcf9da681cad0032de1903cbd41ab52f21ca8bd823a735b17f595626f0ef63bbbf0d09f07fe7af7655b229fe064298e6a6c64859"], 0x0) 14:19:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:19:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0600000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1437.038802] JFS: discard option not supported on device [ 1437.052186] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:19:02 executing program 2 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1437.194712] EXT4-fs (sda1): re-mounted. Opts: (null) 14:19:02 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x0, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:19:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea052a041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0700000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:02 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000040)={0x6dc54584, 0x10001, 0x8}) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="c62d0cf7395e", @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @dev={0xac, 0x14, 0x14, 0x15}}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1437.384176] FAULT_INJECTION: forcing a failure. [ 1437.384176] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.437239] CPU: 1 PID: 13068 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 1437.445916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.455455] Call Trace: [ 1437.458084] dump_stack+0x197/0x210 [ 1437.461746] should_fail.cold+0xa/0x1b [ 1437.465676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1437.471172] ? lock_downgrade+0x880/0x880 [ 1437.475380] __should_failslab+0x121/0x190 [ 1437.479670] should_failslab+0x9/0x14 [ 1437.483506] __kmalloc+0x2e2/0x750 [ 1437.487086] ? mutex_trylock+0x18e/0x1e0 [ 1437.491356] ? tty_write_lock+0x23/0x90 [ 1437.495370] ? tty_write+0x542/0x7a0 [ 1437.499113] tty_write+0x542/0x7a0 [ 1437.502750] ? n_hdlc_tty_poll+0x370/0x370 [ 1437.507166] __vfs_write+0x114/0x810 [ 1437.510905] ? tty_read+0x2a0/0x2a0 [ 1437.514749] ? kernel_read+0x120/0x120 [ 1437.520118] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1437.521641] JFS: discard option not supported on device [ 1437.525775] ? __inode_security_revalidate+0xda/0x120 [ 1437.525946] ? avc_policy_seqno+0xd/0x70 [ 1437.525961] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1437.525976] ? selinux_file_permission+0x92/0x550 [ 1437.525999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1437.532136] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1437.536892] ? security_file_permission+0x89/0x230 [ 1437.536913] ? rw_verify_area+0x118/0x360 [ 1437.536931] vfs_write+0x20c/0x560 [ 1437.536949] ksys_write+0x14f/0x2d0 [ 1437.536965] ? __ia32_sys_read+0xb0/0xb0 [ 1437.536985] ? do_syscall_64+0x26/0x620 [ 1437.537001] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.537015] ? do_syscall_64+0x26/0x620 [ 1437.537033] __x64_sys_write+0x73/0xb0 [ 1437.537051] do_syscall_64+0xfd/0x620 [ 1437.537070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.537083] RIP: 0033:0x45a6f9 [ 1437.537100] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.537108] RSP: 002b:00007f9f374d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1437.537123] RAX: ffffffffffffffda RBX: 00007f9f374d3c90 RCX: 000000000045a6f9 [ 1437.537131] RDX: 0000000100000098 RSI: 0000000020000040 RDI: 0000000000000005 [ 1437.537139] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1437.537147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f374d46d4 [ 1437.537155] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000006 14:19:03 executing program 2 (fault-call:5 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1437.690006] audit: type=1804 audit(1575814742.929:769): pid=13078 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 14:19:03 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x114a, &(0x7f0000000240)={@local, @remote, [], {@mpls_uc={0x8847, {[], @ipv6={0x1, 0x6, 'AX}', 0x1114, 0xff, 0x1, @remote, @mcast1, {[@fragment={0x84, 0x0, 0xc, 0x1, 0x0, 0x1, 0x65}, @fragment={0x0, 0x0, 0x81, 0x1, 0x0, 0xb, 0x66}, @srh={0xc12ce6fc800402c3, 0x2, 0x4, 0x1, 0x0, 0x30, 0x8000, [@ipv4={[], [], @loopback}]}, @hopopts={0x5c, 0x201, [], [@padn={0x1, 0x1, [0x0]}, @enc_lim, @pad1, @generic={0x3, 0x1000, "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"}]}], @dccp={{0x4e22, 0x4e20, 0x4, 0x1, 0x9, 0x0, 0x0, 0x2, 0x6, "0fd0b0", 0xee, "387bd4"}, "718d745f5edc3a4675efce1e8cc65d66d6c85fd7264ef8fe8763d93d0f8451f21626a03ec08f0cba08b7d5c90af77b8b77ab3a62bf02836a8fe26ed2db72c425c3dcee3555a2464aafee8ff3bb3f5752884baac84bcdd8e90e19f35b14a646a826bf2061bc6a581e73d20e766d377e7c7f6217de8868bcfb0fe31da8dbec24a2a1f286e4462906b4c5545a1ac0ebcd91e6be3b553557b6f3841dccbf2ee3ff5671808cac3f80e0409682263006c5e8ca126135ccf55a5d931aa7ec551bec90d1552f3ddf"}}}}}}}, 0x0) 14:19:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0a00000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1437.894478] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1437.897067] FAULT_INJECTION: forcing a failure. [ 1437.897067] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.911038] CPU: 1 PID: 13185 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 1437.918855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.928330] Call Trace: [ 1437.930957] dump_stack+0x197/0x210 [ 1437.934639] should_fail.cold+0xa/0x1b [ 1437.938565] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1437.943824] __should_failslab+0x121/0x190 [ 1437.948108] should_failslab+0x9/0x14 [ 1437.951987] __kmalloc+0x71/0x750 [ 1437.955483] ? n_hdlc_buf_get+0x1b6/0x260 [ 1437.959706] ? find_held_lock+0x35/0x130 [ 1437.963829] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1437.968973] __tty_buffer_request_room+0x1fb/0x5c0 [ 1437.973968] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1437.979319] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1437.979540] ? do_raw_spin_lock+0xc8/0x240 [ 1437.990034] pty_write+0x133/0x200 [ 1437.990409] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1437.993589] ? pty_unthrottle+0x50/0x50 [ 1437.993609] n_hdlc_send_frames+0x271/0x450 [ 1438.011749] n_hdlc_tty_write+0x591/0x670 [ 1438.015943] ? n_hdlc_tty_poll+0x370/0x370 [ 1438.020209] ? wake_up_q+0x100/0x100 [ 1438.023965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1438.029628] ? _copy_from_user+0xdd/0x150 [ 1438.033834] tty_write+0x458/0x7a0 [ 1438.037428] ? n_hdlc_tty_poll+0x370/0x370 [ 1438.041682] __vfs_write+0x114/0x810 [ 1438.045437] ? tty_read+0x2a0/0x2a0 [ 1438.049102] ? kernel_read+0x120/0x120 [ 1438.053024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1438.058703] ? __inode_security_revalidate+0xda/0x120 [ 1438.064015] ? avc_policy_seqno+0xd/0x70 [ 1438.068196] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1438.073243] ? selinux_file_permission+0x92/0x550 [ 1438.078135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.083714] ? security_file_permission+0x89/0x230 [ 1438.088797] ? rw_verify_area+0x118/0x360 [ 1438.092983] vfs_write+0x20c/0x560 [ 1438.096558] ksys_write+0x14f/0x2d0 [ 1438.100210] ? __ia32_sys_read+0xb0/0xb0 [ 1438.104436] ? do_syscall_64+0x26/0x620 [ 1438.108546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.113950] ? do_syscall_64+0x26/0x620 [ 1438.117496] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1438.117947] __x64_sys_write+0x73/0xb0 [ 1438.117970] do_syscall_64+0xfd/0x620 [ 1438.131945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.137169] RIP: 0033:0x45a6f9 [ 1438.138797] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1438.140393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.140401] RSP: 002b:00007f9f374d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1438.140425] RAX: ffffffffffffffda RBX: 00007f9f374d3c90 RCX: 000000000045a6f9 [ 1438.183560] RDX: 0000000100000098 RSI: 0000000020000040 RDI: 0000000000000005 [ 1438.189783] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1438.190842] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1438.190849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f374d46d4 [ 1438.190862] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000006 [ 1438.211570] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1438.211653] [ 1438.211658] ====================================================== [ 1438.211662] WARNING: possible circular locking dependency detected [ 1438.211666] 4.19.88-syzkaller #0 Not tainted [ 1438.211670] ------------------------------------------------------ [ 1438.211674] syz-executor.2/13185 is trying to acquire lock: [ 1438.211677] 0000000037c2ce35 (console_owner){-.-.}, at: vprintk_emit+0x3d5/0x6d0 [ 1438.211690] [ 1438.211693] but task is already holding lock: [ 1438.211696] 00000000b3e4d512 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1438.211708] [ 1438.211712] which lock already depends on the new lock. [ 1438.211714] [ 1438.211716] [ 1438.211720] the existing dependency chain (in reverse order) is: [ 1438.211722] [ 1438.211724] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1438.211737] _raw_spin_lock_irqsave+0x95/0xcd [ 1438.211741] tty_port_tty_get+0x22/0x90 [ 1438.211744] tty_port_default_wakeup+0x16/0x40 [ 1438.211748] tty_port_tty_wakeup+0x57/0x70 [ 1438.211752] uart_write_wakeup+0x46/0x70 [ 1438.211755] serial8250_tx_chars+0x495/0xaf0 [ 1438.211760] serial8250_handle_irq.part.0+0x261/0x2b0 [ 1438.211764] serial8250_default_handle_irq+0xc0/0x150 14:19:03 executing program 2 (fault-call:5 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1438.211767] serial8250_interrupt+0xfc/0x1e0 [ 1438.211771] __handle_irq_event_percpu+0x144/0x8f0 [ 1438.211775] handle_irq_event_percpu+0x74/0x160 [ 1438.211778] handle_irq_event+0xa7/0x134 [ 1438.211781] handle_edge_irq+0x25e/0x8d0 [ 1438.211784] handle_irq+0x39/0x50 [ 1438.211788] do_IRQ+0x99/0x1d0 [ 1438.211791] ret_from_intr+0x0/0x1e [ 1438.211794] native_safe_halt+0xe/0x10 [ 1438.211797] arch_cpu_idle+0xa/0x10 [ 1438.211801] default_idle_call+0x36/0x90 [ 1438.211804] do_idle+0x30c/0x4d0 [ 1438.211808] cpu_startup_entry+0xc8/0xe0 [ 1438.211811] start_secondary+0x3e8/0x5b0 [ 1438.211815] secondary_startup_64+0xa4/0xb0 [ 1438.211817] [ 1438.211819] -> #1 (&port_lock_key){-.-.}: [ 1438.211831] _raw_spin_lock_irqsave+0x95/0xcd [ 1438.211835] serial8250_console_write+0x7ca/0x9f0 [ 1438.211838] univ8250_console_write+0x5f/0x70 [ 1438.211842] console_unlock+0xbdf/0x10d0 [ 1438.211845] vprintk_emit+0x280/0x6d0 [ 1438.211848] vprintk_default+0x28/0x30 [ 1438.211851] vprintk_func+0x7e/0x189 [ 1438.211854] printk+0xba/0xed [ 1438.211858] register_console+0x77f/0xb90 [ 1438.211861] univ8250_console_init+0x3e/0x4b [ 1438.211864] console_init+0x4f7/0x761 [ 1438.211868] start_kernel+0x59c/0x8c5 [ 1438.211871] x86_64_start_reservations+0x29/0x2b [ 1438.211875] x86_64_start_kernel+0x77/0x7b [ 1438.211878] secondary_startup_64+0xa4/0xb0 [ 1438.211880] [ 1438.211882] -> #0 (console_owner){-.-.}: [ 1438.211894] lock_acquire+0x16f/0x3f0 [ 1438.211897] vprintk_emit+0x412/0x6d0 [ 1438.211901] vprintk_default+0x28/0x30 [ 1438.211904] vprintk_func+0x7e/0x189 [ 1438.211907] printk+0xba/0xed [ 1438.211910] should_fail+0x6f1/0x85c [ 1438.211914] __should_failslab+0x121/0x190 [ 1438.211917] should_failslab+0x9/0x14 [ 1438.211920] __kmalloc+0x71/0x750 [ 1438.211924] __tty_buffer_request_room+0x1fb/0x5c0 [ 1438.211928] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1438.211932] pty_write+0x133/0x200 [ 1438.211935] n_hdlc_send_frames+0x271/0x450 [ 1438.211938] n_hdlc_tty_write+0x591/0x670 [ 1438.211942] tty_write+0x458/0x7a0 [ 1438.211945] __vfs_write+0x114/0x810 [ 1438.211948] vfs_write+0x20c/0x560 [ 1438.211951] ksys_write+0x14f/0x2d0 [ 1438.211954] __x64_sys_write+0x73/0xb0 [ 1438.211958] do_syscall_64+0xfd/0x620 [ 1438.211962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.211963] [ 1438.211967] other info that might help us debug this: 14:19:03 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000540)={0xffffffffffffffff}, 0x30b, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000600)={0x4, 0x8, 0xfa00, {r6, 0x58}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r6, 0x1000}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) [ 1438.211969] [ 1438.211972] Chain exists of: [ 1438.211974] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1438.211989] [ 1438.211993] Possible unsafe locking scenario: [ 1438.211995] [ 1438.211998] CPU0 CPU1 [ 1438.212002] ---- ---- [ 1438.212004] lock(&(&port->lock)->rlock); [ 1438.212012] lock(&port_lock_key); [ 1438.212020] lock(&(&port->lock)->rlock); [ 1438.212027] lock(console_owner); [ 1438.212034] [ 1438.212037] *** DEADLOCK *** [ 1438.212039] [ 1438.212042] 3 locks held by syz-executor.2/13185: [ 1438.212044] #0: 000000007d9765b6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1438.212058] #1: 00000000237d1bf5 (&tty->atomic_write_lock){+.+.}, at: tty_write_lock+0x23/0x90 [ 1438.212073] #2: 00000000b3e4d512 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1438.212088] [ 1438.212091] stack backtrace: [ 1438.212096] CPU: 1 PID: 13185 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 1438.212102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.212105] Call Trace: [ 1438.212108] dump_stack+0x197/0x210 [ 1438.212112] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1438.212115] __lock_acquire+0x2e19/0x49c0 [ 1438.212119] ? mark_held_locks+0x100/0x100 [ 1438.212122] ? find_held_lock+0x35/0x130 [ 1438.212126] ? kvm_sched_clock_read+0x9/0x20 [ 1438.212130] ? vprintk_emit+0x3ed/0x6d0 [ 1438.212133] ? trace_hardirqs_off+0x62/0x220 [ 1438.212137] lock_acquire+0x16f/0x3f0 [ 1438.212140] ? vprintk_emit+0x3d5/0x6d0 [ 1438.212143] vprintk_emit+0x412/0x6d0 [ 1438.212147] ? vprintk_emit+0x3d5/0x6d0 [ 1438.212150] vprintk_default+0x28/0x30 [ 1438.212153] vprintk_func+0x7e/0x189 [ 1438.212156] printk+0xba/0xed [ 1438.212160] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1438.212163] ? is_bpf_text_address+0xac/0x170 [ 1438.212168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.212171] ? ___ratelimit+0x60/0x595 [ 1438.212174] should_fail+0x6f1/0x85c [ 1438.212178] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1438.212181] __should_failslab+0x121/0x190 [ 1438.212184] should_failslab+0x9/0x14 [ 1438.212188] __kmalloc+0x71/0x750 [ 1438.212191] ? n_hdlc_buf_get+0x1b6/0x260 [ 1438.212195] ? find_held_lock+0x35/0x130 [ 1438.212204] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1438.212208] __tty_buffer_request_room+0x1fb/0x5c0 [ 1438.212212] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1438.212215] ? do_raw_spin_lock+0xc8/0x240 [ 1438.212218] pty_write+0x133/0x200 [ 1438.212222] ? pty_unthrottle+0x50/0x50 14:19:04 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2200, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000080)={0x15}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000ea01000d0005e126019b0a93e2032ca7135c2e18"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') ioctl$FICLONE(r2, 0x40049409, r3) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x44ca84, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r4, 0x9}, 0x8) [ 1438.212226] n_hdlc_send_frames+0x271/0x450 [ 1438.212229] n_hdlc_tty_write+0x591/0x670 [ 1438.212232] ? n_hdlc_tty_poll+0x370/0x370 [ 1438.212236] ? wake_up_q+0x100/0x100 [ 1438.212240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1438.212243] ? _copy_from_user+0xdd/0x150 [ 1438.212246] tty_write+0x458/0x7a0 [ 1438.212250] ? n_hdlc_tty_poll+0x370/0x370 [ 1438.212253] __vfs_write+0x114/0x810 [ 1438.212256] ? tty_read+0x2a0/0x2a0 [ 1438.212260] ? kernel_read+0x120/0x120 [ 1438.212264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1438.212268] ? __inode_security_revalidate+0xda/0x120 [ 1438.212271] ? avc_policy_seqno+0xd/0x70 [ 1438.212275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1438.212279] ? selinux_file_permission+0x92/0x550 [ 1438.212283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1438.212286] ? security_file_permission+0x89/0x230 [ 1438.212290] ? rw_verify_area+0x118/0x360 [ 1438.212293] vfs_write+0x20c/0x560 [ 1438.212296] ksys_write+0x14f/0x2d0 [ 1438.212299] ? __ia32_sys_read+0xb0/0xb0 [ 1438.212303] ? do_syscall_64+0x26/0x620 [ 1438.212307] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.212310] ? do_syscall_64+0x26/0x620 [ 1438.212313] __x64_sys_write+0x73/0xb0 [ 1438.212317] do_syscall_64+0xfd/0x620 [ 1438.212321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.212324] RIP: 0033:0x45a6f9 [ 1438.212334] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.212338] RSP: 002b:00007f9f374d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1438.212347] RAX: ffffffffffffffda RBX: 00007f9f374d3c90 RCX: 000000000045a6f9 [ 1438.212352] RDX: 0000000100000098 RSI: 0000000020000040 RDI: 0000000000000005 [ 1438.212356] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1438.212361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f374d46d4 [ 1438.212366] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000006 [ 1439.037948] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1439.044344] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1439.050822] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1439.076926] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1439.087681] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1439.105650] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1439.112151] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1439.118229] FAULT_INJECTION: forcing a failure. [ 1439.118229] name failslab, interval 1, probability 0, space 0, times 0 [ 1439.134143] CPU: 1 PID: 13502 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 1439.141950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1439.151320] Call Trace: [ 1439.153940] dump_stack+0x197/0x210 [ 1439.157607] should_fail.cold+0xa/0x1b [ 1439.161523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1439.166661] ? is_bpf_text_address+0xd3/0x170 [ 1439.171192] __should_failslab+0x121/0x190 [ 1439.175455] should_failslab+0x9/0x14 [ 1439.179288] __kmalloc+0x71/0x750 [ 1439.182767] ? mark_held_locks+0x100/0x100 [ 1439.187030] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1439.192169] __tty_buffer_request_room+0x1fb/0x5c0 [ 1439.197133] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1439.202712] pty_write+0x133/0x200 14:19:04 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) fcntl$notify(r3, 0x402, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aac6aaaaaaaa0400890000000800450000280000000000069078ac141400ac1414bb00004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090780000"], 0x0) [ 1439.206288] ? pty_unthrottle+0x50/0x50 [ 1439.210320] n_hdlc_send_frames+0x271/0x450 [ 1439.214689] n_hdlc_tty_write+0x591/0x670 [ 1439.218913] ? n_hdlc_tty_poll+0x370/0x370 [ 1439.223171] ? __might_fault+0xfb/0x1e0 [ 1439.227178] ? wake_up_q+0x100/0x100 [ 1439.230924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1439.236498] ? _copy_from_user+0xdd/0x150 [ 1439.240686] tty_write+0x458/0x7a0 [ 1439.244356] ? n_hdlc_tty_poll+0x370/0x370 [ 1439.248638] __vfs_write+0x114/0x810 [ 1439.252378] ? tty_read+0x2a0/0x2a0 [ 1439.256028] ? kernel_read+0x120/0x120 [ 1439.259943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1439.265513] ? __inode_security_revalidate+0xda/0x120 [ 1439.270751] ? avc_policy_seqno+0xd/0x70 [ 1439.274846] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1439.279902] ? selinux_file_permission+0x92/0x550 [ 1439.284787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1439.290366] ? security_file_permission+0x89/0x230 [ 1439.295331] ? rw_verify_area+0x118/0x360 [ 1439.299521] vfs_write+0x20c/0x560 [ 1439.303137] ksys_write+0x14f/0x2d0 14:19:04 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x4441778413f557b4, 0x0, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1439.306813] ? __ia32_sys_read+0xb0/0xb0 [ 1439.310934] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1439.316348] __x64_sys_write+0x73/0xb0 [ 1439.320272] do_syscall_64+0xfd/0x620 [ 1439.324115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.329361] RIP: 0033:0x45a6f9 [ 1439.332579] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.351601] RSP: 002b:00007f9f374d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1439.359425] RAX: ffffffffffffffda RBX: 00007f9f374d3c90 RCX: 000000000045a6f9 [ 1439.366713] RDX: 0000000100000098 RSI: 0000000020000040 RDI: 0000000000000005 [ 1439.374007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1439.381327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f374d46d4 [ 1439.388632] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000006 [ 1439.395767] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a2f00000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1439.411818] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1439.430755] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1439.440826] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea052b041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1439.470326] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1439.472989] JFS: discard option not supported on device [ 1439.495926] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1439.499005] kobject: 'loop3' (000000006ef824eb): kobject_uevent_env [ 1439.520565] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value 14:19:04 executing program 2 (fault-call:5 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1439.561747] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1439.564634] kobject: 'loop3' (000000006ef824eb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1439.608255] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1439.617327] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1439.624240] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1439.635369] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1439.647287] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1439.665112] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1439.683841] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a4800000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1439.721942] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1439.734203] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1439.747508] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1439.762760] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:05 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1439.773408] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1439.811324] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:05 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYRESDEC=r1, @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090790000"], 0x0) 14:19:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1439.860018] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1439.862260] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1439.878501] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1439.903555] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env 14:19:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a4c00000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1439.913574] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1439.934675] JFS: discard option not supported on device [ 1439.952874] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1439.968908] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1439.977071] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1439.983917] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.007856] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.024319] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1440.032397] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:19:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x1200000d8) [ 1440.074301] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.085047] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.109089] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1440.120861] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1440.125879] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1440.134674] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.143457] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.156904] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea052d041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1440.166884] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' 14:19:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a6800000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) 14:19:05 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000080)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [{[], {0x8100, 0x0, 0x0, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xa, 0x64, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x14, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x10, "23ecf6eb841fbebf03be9e0a4d88"}, @generic={0x3, 0xc, "5e838224e5698bd96df1"}, @window={0x3, 0x3, 0xfd}, @fastopen={0x22, 0x10, "8d38efa2073f0802c661be3af5fc"}, @fastopen={0x22, 0xc, "544e9002b68e360e7c99"}]}}}}}}}, 0x0) 14:19:05 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1440.249375] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1440.265397] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.309088] kobject: 'loop3' (000000006ef824eb): kobject_uevent_env [ 1440.340936] kobject: 'loop3' (000000006ef824eb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1440.354136] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) [ 1440.380423] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1440.388754] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1440.421856] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1440.431693] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:19:05 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, r1, 0x0, 0x16b, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00', 0xffffffffffffffff}, 0x30) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f00000002c0)={'vcan0\x00', {0x2, 0x4e22, @empty}}) fcntl$setownex(r4, 0xf, &(0x7f0000000280)={0x3, r6}) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) listen(r0, 0x0) syz_emit_ethernet(0x49, &(0x7f0000000080)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0xfe}, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}, {"fe0d500f525c71496752c091b7789c6bf90713"}}}}}}, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000100)=""/201, &(0x7f0000000200)=0xc9) 14:19:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a6c00000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1440.507934] JFS: discard option not supported on device [ 1440.531438] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1440.533852] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.539293] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.557253] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1440.573148] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.575527] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:19:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r1, 0x40049409, r2) sendmmsg$nfc_llcp(r1, &(0x7f0000000e40)=[{&(0x7f0000000000)={0x27, 0x1, 0x1, 0x1, 0x5a, 0x40, "6697b817fe6b2db46a0eda4ee6ed9a6c062d98e987556423280049b9c61c2a825c23bbbb4c8c64468d14634e195d9e4850baccb409fb259fd112dd02fbb4ce", 0x35}, 0x60, &(0x7f0000000080)=[{&(0x7f0000000180)="963454706b27afb0ae7b132812b889f9857b1ccb816a9c00d1eec49d02ee46b8f6da27f5104a839a4bc9a0a4fbf318478f2200ea45830e95aa1c763254a547da8408a47ccf224c6c6986f4b5d5feedb3d52e1f9998ae98f5b09e2a686ac90ca612f201c9a7509e250cf740d73345e2a417b2c0568d51e993", 0x78}], 0x1, 0x0, 0x0, 0x4000014}, {&(0x7f0000000200)={0x27, 0x0, 0x0, 0x1, 0x9, 0x7f, "22272c04b716c8875d8225fddea38df4bd83eabbc54cb2140e11a0913b33a034d9da0350213fab5f2e127cc34a9b7665a6d53fe56bc5593517d05617212a0a", 0x25}, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000280)="86545267255573a16e3259c22bb061c691770498e1ddcde25905d10cfbb998673ccd75b6d089843c60b54fccbdae8918e6326b2d95a417c86f16c590b8bb1a228ecd7d30ca0303de74b9e2c0e8d030c37ea2aca4d5534f4de19afa2e7173470ba36a188d7d22c47bd2e67b1455af10cd4597efa455303bb3b85ef24e9999d0376b53f03eadb919d8440e93d5b3dc11779d0793fd9cca", 0x96}, {&(0x7f0000000340)="e3e2f943356b7b10c9f0f3f8843b67ff1a6390ea76c3083c4ec5e11bb03b4582ffa3cd93042760376b54aca69afbd434a2fd64d7124047788c3da370c02723815dedc2a6f405f27f350c4e2a85254ec52ae33416c54b5abb0db0e9f8cba0e1d13eea2bd00e00bc1eb87061ec788551015184b8a2138b903c82b0987cf44b", 0x7e}, {&(0x7f00000003c0)="3219d94b3fc75d4a8f02040e9237f03454b8fa95259e94d4b7fc0c35adac3caa6e16e8e830e53ba2edb8baf9eba5dcd264dfee57046bdc5a81872bf0a3d4f052bcde75b6b6543e0e010c570d42f4c578ce4e9edd9bf7bb52e52bb690db4e75586197e0d71aadcd1786b342581e826cae391a43aae453d1b61d91e3a9ac311fd43093c0f95f200c48240a30f0707b3302eb86761357b7e77a50e4a9cd83291bd548832a83245cfdededf04a867948eb94f2a5963a55c58544629583dadfde794b55bdbb65642ada9c50080cf2b9959025afd91a07b536f1789101b1eb6fb378261dd293e6ab2a0a2ae81d6ce8", 0xec}], 0x3, &(0x7f0000000500)={0x20, 0x88, 0x7, "a39388197c3d67c9d9e13ac7116a"}, 0x20, 0x20000000}, {&(0x7f0000000540)={0x27, 0x0, 0x1, 0x4, 0x0, 0x7, "1a197296df86e63f00511046a254bdb35426c3218720555ced8abf2fc1a7dc9f9211064915e78ed67d47cb42a7e3ea24ef9bfa9784c9083744d7c53009b5b5", 0x2a}, 0x60, &(0x7f0000000780)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)="1c585a208d98323ff1d55ecc72214fe7e895e78721eb01951963f0bcdec3b9ecfa5e803e51152d305cfabe1efb21ff08cd066d49550f96ea9d333a516af4ed924320853a31", 0x45}, {&(0x7f0000000680)="8c3f6772c0197582104e9cb224ed0c210899cddc02316e9aedd3404a3778721ef30e8582c500e16c8986ed536fcddcb6084957eee879cf0b03cea72df407436c11b8caf83dec8cba4a2d84edb0df642eb1f47b0f89f6716ee82e448a306f792ba735316c5caf084ca9ee035624de5ad0aa4816d1137debf33229722ceb575dc2b094e6fb1e0981a78fcc4304557848da2a34e1ed2a0d70c73e9b28de48fd3963ee32cd9eda925b45acf17c5ce0d04f507e5e2ed5d9ac7d2d15ea62e808e572db0d07754f2aa2ccf2ff1643fffc60fd112e48d9c9a9cca2d613d838bb7773a7df0ad0", 0xe2}], 0x3, &(0x7f00000007c0)={0xe0, 0x6, 0x2, "e47ccf3995b5da4e072abe5de1bbbfad712dca754de71f817aa0d49b3f07a6e0e0f8263723bb4477370666b9fbced2f81e9fe101f9eee94a5679cbde43bc7e3a63f99506663d694050c6155709166e44155fe18b6eb3ecd667c0558a48f01889fae8034b0d907e814f213e240d6266fc3521e91659a5e926477a7adbe7d91b551e5245afea675dd5410afe945eb6ce4bfb2c6391f441db3e65085f1b9b7acc8ad51165489b68332dad142fa848806c1f512915f2454b20f485dee3a64b3a6ab0ff798e680f4899d810"}, 0xe0, 0x8080}, {&(0x7f00000008c0)={0x27, 0x0, 0x1, 0x2, 0x1, 0x3, "e81d678b366389d88e4ab3b26a49c2c0888f6ee04d62103d94a8b068f73c709b4eae85067d6c7b0b57bce0f9291dbf84d2907233644dc758c696f92ebbcca0", 0x14}, 0x60, &(0x7f0000000a00)=[{&(0x7f0000000940)="401cbad38d3703d2bed8b1a33650d74c1c95d1ac6bbff35325615f69481dcc83a05f26042eb3921bddd8a7d968aae1dbc47a97f66c87276abecea9f4045f70dad73150721d3ebbb7f35bd758c134", 0x4e}, {&(0x7f00000009c0)="1e518e741160cb31b0683f41ca90ebe7cd84ab020375bb7fdcbbab4969d707488f8210f6e6", 0x25}], 0x2, 0x0, 0x0, 0x8844}, {&(0x7f0000000a40)={0x27, 0x1, 0x1, 0xf6972ed4b1558304, 0x9, 0x4, "0e1b32c6cb1cfbd71905718df0d3b861758da94826d0e118d3edf2b6c0e20bf8125148786071f9a0cce5dc91b247fb2377c13c7e28f46b83409a2cc5d70cbf", 0x9}, 0x60, &(0x7f0000000d40)=[{&(0x7f0000000ac0)="42e132033160e098e8828fef944bc5ad3d2eb82d9dea4f1aa74ead627f6a72f7d40ab89062b398081d17b9c576687a5878c1205eb6283bf9880800af6694077aae3f5f0d9732f828e003fc59227a3d4620e36b5a77ef92be4a260246e0fb6b196ca9a92a6e12ff40b5a5dca52ed18c129077a459b4870918c6089bf0b80556229a0256129a0ae38fe46e6cb3226b9ff31ff761187df8f932d7c0c05aa3e1261b4f16fcf695f337", 0xa7}, {&(0x7f0000000b80)="ebf5890cdd48f3004cd1c83521569a27324139ab234e10dcd9c10a59b19f0f74a20982033735a0ec5a7ba8c9c7be28127c537ef6477c", 0x36}, {&(0x7f0000000bc0)="e034350d0597949954f6d783733016fc634675b2dfd1841800052fa5f4eb5d98547091", 0x23}, {&(0x7f0000000c00)="51ec3affd337cdacbe3cd1c82a232d9fafe30034b5fa7818a7f2d615bb51da500bd786f0ca1e25621dcc7818f12278557f27f75a1e19e34fb531bbad64ae4177f5840b07237401a4cbfee4df28a52c8d2dca5520b9736c02ed83447b49bc17c2e00396a50096b95a89637db8a515d1fe8e577fdc7ea9d92f264950c4747a5c3e28680439d6d2dac3f9285b414e9dfe6cbc16451bcd4d7bb8998f5884042064f0a569b45e035201f381676f14d3aeee0cd30e43b6be5a996e1251da46d996ed874a8f7282", 0xc4}, {&(0x7f0000000d00)="36dd6184c30dcf6c1fec2f4d53ebdb", 0xf}], 0x5, &(0x7f0000000dc0)={0x48, 0x11, 0xf0000000, "fb1230d2f42d36539e0666d62bb763e3aba4acc0df3fed2572b43d7dba25bfe1cbff616bc5a17fac3a89906ee71219d8a95b9d91f4333eb8"}, 0x48, 0x4000000}], 0x5, 0x54) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaa0000890000000800450000280000000000069078ac141400ac1414bb00004e20cba12cd007df98f6834238e311003e1bbd50cf8c60f60d94f3f530504a9b539ae15f9e9c192e265be25a45b6c76bc3d6c359b5c2a7502c68681239066b7c701b25c021fbc5f42d5f007187fff043d56ccfd2e0aad4f62992f56fce16d725f5f153", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5002000090780000"], 0x0) [ 1440.616008] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1440.618006] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.636110] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1440.646948] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.688077] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.709613] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1440.718623] audit: type=1804 audit(1575814746.079:770): pid=14286 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1440.719906] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.762113] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env 14:19:06 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 14:19:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a7400000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1440.781228] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1440.805794] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1440.825785] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1440.844151] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1440.859389] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1440.876085] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1440.882768] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000000, 0x94803) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x9, 0xfec2bac37cf32656, 0x4, 0x1000, {0x0, 0x2710}, {0x4, 0x1, 0x2, 0x7, 0x0, 0x1, "146d5f24"}, 0xcb, 0x3, @fd=r1, 0x4}) syncfs(r2) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r4, 0x40049409, r5) bind$isdn_base(r4, &(0x7f0000000200)={0x22, 0x36, 0xaa, 0xba, 0x46}, 0x6) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r3) [ 1440.890281] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1440.902005] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1440.949185] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1440.967183] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1440.973313] JFS: discard option not supported on device [ 1440.976828] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1440.987484] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.002593] audit: type=1804 audit(1575814746.359:771): pid=14511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/" dev="sda1" ino=24 res=1 [ 1441.009009] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1441.035416] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1441.087774] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.099292] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1441.117514] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1441.124106] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1441.135716] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1441.150247] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.176529] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea052e041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a7a00000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1441.183050] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:19:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x100) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x1ff, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000680)={0x1, 0x20000000000000, 0x2, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x400}, {r4, 0x0, 0x1}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000640)={r1, &(0x7f0000002a40)="b6a4b7dffb90c1216e49f8379cf2511af91e3aeabfafa81831a69fba94685350797ea11f4e354630328a8b675668dfd02b01b91d6a9cdc6f7b70464dbc16cdbcbeebc32c68d80019a2dd4358b51f6aadfb36421cc935a5a00ca2026f470679ea0ea448d5765f79a8fd3a62022c2d9f6406d45484d1d88734082f697c0db4fb0f8be5cdf73aca41b4b9d4e511c8c0b92a7cda53a2b4e064edf62c8bc4904ccf465304b87fcb5601ff87f1f928cdee42d5288aceba9a956d2039ed4137ad850427c154e8b2a820d31a9b9e0f58d6b14e8ba92aa000dc4cff8e8725f0dee82d4c9ddd38cab69c5c40c7fe9145da3705e1560876f68c911818559b0e61dff6f6f9c66b34b92d3a2f1a4346d496bd7543dd4b13833f8b7a4de8f0130adcb8b43bad83f49ead1538c330e2042c1f11ce792dbcdf70284f99d8c3a03d01345151c15fe429a1d8758e52c352ee96f4bb798b7c304f3782df98ac57cd45dd5cb93475fcc460c59c7133dc258e6df65c6cfd7c8cea6543695d93ffdc1de143e56fbd608a8c5c45591013a6586f17079dcf55f7f972c2056718b1c5fb8d66e7939a53839ed73920d356b59e927d403c07027ef5c79b4c20642e65ea5ff924af65bc48060d221ee3d8e8cbce9fa61581596087be655be6f9638bf76204d23133a2f75768917f9c2ab5cbb87476940d550bf87207887b7d4e5a96ac649bb1240042ca422ea3933e5586b939abe9b408c3feeac18a46b780909dd1b60a04eabf3d319c62560a61973dda479f9221f418d0a665f7eb323802f19bcd15589f720ffc9743f10d1a870a2e2dd81cc41fb5c1cc22121b441bff9b55431200bce67de01a2d15440d5233d407177e6f5acec5173d14f8ab858ff6e29bb05c21dcf557340cb0f1d450cd05690663b793d92f0ea86dab3cd79c30b58d1662c3acef15d4df5d5459e623b4b85e8532d0f0b1de9e6baa4049babd31990d7c3d9d8c5b3e9e1f42ac4f08f8e0d53f95f5db8dde925d3386b291eae86b13f77368aac05202a7d57ffd661483cdf040b3f09d553916bda716456ab810920e5af0cc69ab1d626dc0981a9b44414edb8036cd25ecae6423a31d2910b98503cc1e0d10214fa6cb22a14afbab70c6b1070b694345f28a259f89ce96084db1e1b38b373eb6939f21a91a08ae8e9344890f71cda7382a551f9d0355d7ce49d36422fd01babff1351abac323ab1909150b863454827e421aff2d5277d7a359215965b7139292cb574be1d0f3f6c8345808849490b0e81f51bffa83541d7f6a010dad769156fd9056796d10dcbefcfe37815957658bf1167041046ad418cde5625303efe165cb7c487f247bc86374beb682915faaee707ab2e9ab957baea9cb95e34619a9f388db6afc74a119f66ff17474c75950837b5018c119af734e535e0ef590f6a8cca26351c77ca53ab199ed56e8cc2e2e4782073d9aa2a9c89a99910cdd9bfce564330f4ca789d309da7117c6a822b0f7f5dbefee4ce1a3faab8369d52197016ef43ba7f75c56d32bc6ed70df317edd4103f62b09332fff250121961bbf065ecc64539dc607449e46201afced67a27884baf36bdae9237ec20e6da34fcc8b17d12639884605bf6a84133af96383f0a3925b3224ed4b63b27659eeb466910b75305ec641bfc3cef61a970f8d848818dba46972c1af0c3b3932eeda4119371cae9a778cadfded221e97ea5ddb3796270b075fd4254b0d96628fc10ff94eac642d0f060f4c6f091eb8466c83f9999b4c4d7d6086620a78a4e14c56cd0c222a02ddbc14306b66eda17703cd347612c654162878bc5341ef3327e5836b571ff0f6486bcbd4dd46dbb9e55517a39272e21d30f1c0f212a2a9db10859bc45982da9f9518a1b62df1962260a161c00636c6624bf20c4a74beb5036c18957efd02ee8b6eaaaaae148d76f4c719c04562e4f7403d2cf1500101e9aa62c757d99fffb985b088a50a9a37fc8a6d7a6d7e335457d8f55a1618c3aee58e8e008c61ebdb170f28e148eed24696666b6105ed323d7602d91d68881c615cc724cde8e1e3f1a7861996645ba8db6ad05ee44bf8f04ca06b703118baa7ad2a4099f53a437e349d4e3b9e992a2b712dde8a5858f66802d241f5def825600c698d72d6c5d685074611dda37af0dcdc788880a04954058d7c816769ad2ba0ad6a577590d1b397ca16b6357bf3f504d3666afb8a5a4221d9b14fa037dc4586c7f1713494fee33875b8fcc6247a9c5c0e174af406f58d39ce4a33ef1993f1cfef0a4595aff4c0cefcc7bc0a17946f9b3c3b5a3e1db283d4e6ce1cbab62db2ecae2f20bc62b352523f80f325a15f019ca98abdb33d396ea04722697ca66394f9e618a08518fdd65455ec5947ea95be102004b9ba54eefd411c59f5502bd874f80575968b6d829b08f244d4ce3d71054e23a6fa0d44e7e5ce4a941f0ad38acf3591ffe8926c52ef48bcd8b73c966ba100ac6c95c4ad2f33a7022540e096d0be1877d4df54e4470c5cf90e487153a43ae424da60a70ae5535b0e1f21b547163ca0e917b1bb6f7a8b6e3caa2a1cdff55b288ecf88ee5fedaceb2ef221be955019401269c9fabc9a5390ce3dde5fa64629b590e6aab7a117f87cd3c1057927abdca7d5b3f8964ad401af63d027f0044afe57bc91824963e46bd29551dde583d4e8b18b6f6240c28909a2c4dc1788858a0af8c8671575d30645c4345db1e5e69472a446849a424e0293f17ae6b7811d5c918690097941e6d8040d1ab7384b54350a7dc52471d250d3ec002fa8c89ffbdaec016ffa3db04cb2e58000328101c08d720738ce08c2651d87e588d045a8b0de2407321b6c63ffeb8544a095ce1153af2e4fe63bfa96510f1a0fbe114d222884a204afdd404059d17949d3fbe765dadcc09b41ebff2e90ecc945029438b719a2be180ab9769607686ad70ea71a5c35999c0953cf697d29a36ce1887c2dbf57bf7c8a6df0f32152b20256630f33bc57cca7351e1d59807d779cffc3e49ea9f41787b81f5d3499e09fd98f2be538909e30ebabc11306121a167b35e94b8759d978d9bb18f66aed9a04aae253147c4e65ca11d2ea399ca974b73eba7c3023d56082f181bc9079a038db3b613baed6d1150f2b8091d59f2935a7a601d4d6c250dfc3d147b81f628f84d3a8d2cf4c627eccadc69a318fb69f639e052500f3572360c22a1c92f58246fcd4bece07f14ceb0b45d80b1fd2a18461d63fda31f9dcb9a711c04f549ff54f844f503768b36279fa9c7da87a4569adc3f5d96b8ea8ca24d7e02be4413cf9431675ba14da229f0c42e9d74f17f34be3e8f6b027b0c5e3b1c7d79a4975e89417ad5d4a6e06c95cc39016d8f35f4d45d7695e0ffb64ab81876092b1cb107fc56466d0d2aa1ee49ae5bf31b771d0d119a4136b0d153956011786f958797b4a0266ffc701a9270b091ca9f2b8eb24e1f02787ed957820327322958f80a1b994f03dc16c33117b82aa4a803d29c634b427c474398b9f31629fdb1b1466e711131f020da07a3b52b2bc4525c8755cb61a5f24188d766daee7d5e808d7a68f0246048aa5a8623a82b1d93eb8d36671a02c38d1488fc539b5bf736a479dcb68149913885c65e35a92694430eeb18f8573c5724623704f7fe031535e53e79eeca2b7f6b560a875da9d10a98ab24ae864b24aff5e619d5a42e41fca4fea66f0096b83564ace6e3a50bc7fd63661f6268084707ee626c86c088053eb8548331b87d1a08d9fa9e2a8e2f74b115c63212ef2b60fad56502f16d53f569cb4887e49c22a4667200c7e431bbd54b237b12202ac49e4c82b096ba88a2655cb61dc257d26dc180243da8943f88853eecbee3dc49ebf12146eb55d6bf6f61a2b9e6208f64924694d08634ec9b68469f33d0b06c028fb1825391989d66387d90b95befe838d522108fa29c370ca822a363ab319aa91c89ef07941e462df6ba68739c0aa54230219cd70ad83f000e78b908979731d5c3eb3c2492f0366b83155ba24f4bff947a5d655f61acc421ecb42af200c1a82cf7c5957595466cd76cef5340a4ddd667a5a3590fb321f6b6234310ad694c27110dc0d08b7200e486b4a99387d4821457b207ac0033576ffd5bbe3cce622c5dc95cd3b4e5094824d378bc170e83c8f05702faf53c3cc0b43f0f7de63de9d5fce61b575295017bda5f4e0a1067a0e4b6b7895ddfb758853daae5382185c77b419dd7322f06ca1ea85a8a409da4f5da009d51d85767a3f88088adb9100ebcf1a79c61a3e0d61737063030d8681793664803b73fd7f25011b33fe6f91f5b48877eaa86e43498fe8bf3c90fcf54dcbc933bb6325b9dcb1e575f6de6115f10776ea7189d72ade42aa382322638666ac9de05a2f6f5db6d0eaa93fb96aed9bdfec691caf6204fa6d84903af106a02bb8f7b2a9841681e3fd01b6a04f27a733ecddb44e06a69206d88af7582021a89c5273602b86a9ef95651d0468dbd58eca272fd7a6b94192c0e47485f5df060e4120cec0b27e4cc3f1aff90a5deb47344c223224f3b8ba2e0eb460274d280fc12e4d458d693ae50cbff8be520e6273b7d7687035ccf0e814c4223df55c5b023f07608f923beb7d01c1994e4acd7cf3b6653e708b92bfe5cbdbc7aa555d47e17845886919dca30d825e19dfb68b2157bfbe339c3910c9203b298891a9a559533af2d2da059dc7c1718624182bb8c4e4ebc13c098ed27a753a27920f516cedf98cb453106c3395f22532419074efa88c57c472b25e0956489597cf5ac00cc693758259dd70f66fd16aff2431f45abc1b3cdbded2a243712306fa25e164960bf5aee1f49631d750207403b45c7bf840acb13115c591bc693a6c38c46984bc9a318fb2bfe6291f4c8f9689dab0b7a4c122b52f4d3a50902ed8a41c4515c6802be17b3e99ff999e4dee4b2940d4cc89825a1a97c310b79e4547edc4e00607be58fbac352089b6b0ed6ba917f9983dca183ecf2629266b280926cc52561c9c81583d639fa2cd76fbc16f388ea8d2ee4555264457e3e8387a921836d276d685ab6cc25e3acc7f08b1a5a71cb0b2dc6b58f8db6c966986f3e310e9b1dd280f9dd45ccdbe3a1fdc1263f000ecb5671a18dc477ef978846e8a334ed4ff87a5b2f477fc2e0ed0fad633997c53c7ba98ea8dbf7c57882a0ad1c81864b21afae7e36d8457b16907a4118d05692b00b8df9bd743f720e6b658df08baaf7affb6aeec7f9e5bc7135dcff620c02cc6f13d226ea83d2687cc6e9f2803d882518a040d6beaa8aa614d6e2600e3d5a6afbca11efcb516a8d215681c4d4ea045e0f424b4382cedaa2af66c0a233c3d4735dd52e1e56fe293e6c6d364f8306ff1802c8d8b7e8e1cd02780eff4e9d8ea75cc187b4b617988c98d8a86d2c6c02fb6f07eedefcf2016551655929c7152725f9fd82f90c8e4e71e239ac6aa014bf99aba6b3eeea739c75a38e3cc26fcc2de6111ab4b2b72dc1ac71333fcabaa6ed248bbdcb45fbc7860bdbfc481e29e4b2e40d03219675c3e15cfbced416d34e6fcbab77d504b4190e713b64a5a04106e8fd9d6393f12139b32684273a51133e3087ba45392c73107c43c84d53ac7c5139eadd4ac404723dc272ab38b85102dff7608c15dc097e37b6fd09c0a264c0f1f72a9ec50ae3501c6a6c4e63d2b40c94455f8ada9e1828392c10b57b40aff4d249fc0b9e4a98130306d995c5c0c329ce0a578b46da1bc65a10a13239985ba8e187cfe8809073d42224f3f8656ce29447a06c319e95d9011e1a46945cb23866b650e1d021abec1bc59a3706fae18", &(0x7f0000000340)=""/15}, 0x20) r5 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r6, &(0x7f0000000700)=ANY=[@ANYRESHEX=r2], 0x0) ioctl$FICLONE(r6, 0x40049409, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x8, 0xffffffffffffffe9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="060000000000000018"], 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r8, 0x40049409, r9) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)={0x2c, r11, 0x17, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$alg(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000000140)="47a3e8abfd7a789c254171ee6b96e0b802259cb1c3a864e0dae7237296b92dacdb3e4d7402e177268cf6d9c75145431d024c1394a14c31d9e32ba2d7a55d2d96d3f60c467861b8b1fde2d679880f3487fccde918f63e23f7c43c", 0x5a}, {&(0x7f00000001c0)="7ef7b70f89c06c63c805480f9062bff9d6645027702277dac961c98c7952c598a22c746632a7356c8cbc179ed9e2c88d0ab93c5b0982c0bd83837081c577a6d2978ef67b", 0x44}, {&(0x7f0000001a40)="6f7c88b5eec9bad0319845d6808459dcda80077ac1a329d5ee216d0af96751842676ae122fbf07b93fb2ce16ed0a2078eae3ea03c1c8a5d48882bc626dbfa80bc3daceef64a90c9c117233012e9149889a4dba4a2536789a97d5a91af1ef47fa202684058014eeb250bef5aa2082fa06dc3a545f72a9755af071def1a5dbb46bd6a6fb30031875c6124a5d63cbe1cc14916580bf53e6933ab48d668a69229e70c4946f1b073076f30e30b0db7af626870752db40ae207bccd6050143716dddad635631711c179f1184b5f3323f4bdb4ff3a9d8608fd645d2c96f520d33f94a1f905e841a87004109ebcc0056a0a18360bb0d5f59303a9767a61d294e61389bbc691b15f327cbb6b6535140c5f3d2212cd3c5419d4d4a04ae8bf621278b1c33a33ea85c92f9d971b248775c9ea7b7c3bef57d99ace87171677dc1c63e0075c1de882285093d936e06bf89a5ab1341a8dd1d15b9f75d29e093dca443bc7a6c3a29a2b7f297317827f0a215b65af0bd28178b75ed3dddb399846df19440b30dc77b34e9bf50ec896e9e34c0a61f588ce76921db5b600702f8b13378eba73f22544b34b75f4b7c36bd1e20ec7e2d09875b7e640d95ac6012320d89f68bf87e62a1230180ef0182200fe662b6bd03690d1ea055c8370c593f8935cbb261ce708cbfde306ad06457689e97180c8d5459478deb6cc237684529d7e7671963d34dade8fcc274be5c3c07b32077daa4251c4a5091fb8d12da30da53fa344a08504eb43e84f5d90e502eaf0afe84ef464998ad940e6c9f72e80c4c9f0a5474ecc2d04eed304bb2953885ca3aff7237fe224783357f620b9206ceb439419d4d802175f6811759a6caa7c018f9122b217bc340d44815aaa931b43b5b4d16120f20afc142414f8e3a871dfde46dd8373b07824ad486b15f1eed8119925df620f12314de0198aa43f0cac009139e0923667a1a3888abef99ef028482f4d055f3ca07701d50827ba4e81215c04ec482cb7fa0ac7a78687d5e56df62abf87aff5841a863df1e78f54650f93b25cf069c8028152db03ca05144b12a234beaa253247e97f677f8b75180dbdd3e98bc1de51717f5ddca7334f04f9eb56d7cb8d38925781e1693f9f8b4e82dff2ef2cfecd7af287d489b2a03322ece3a9d277482d36ed7fc7942e3cd246cf1b9f9e94d568bd754cb8c6454afa93daa0cc5721d31e01c9b865f5ae2409f9a78ffbad2846b8d92de1274f4962355dd9a4417f2c5c684084d4907e0747887be073c2b8ead0d958e6fadc767840137cc28e66f8e6f4cea9afd7a08f70bb30ed4e4272a1587981c80c69d365586deb5c0fce728e9e9a67aae6622f58673b24da68b8733fdaae5726aa924f82d46680ef19226efc959d3327460bf54b942f49d671ea7cceb1a96aec0ff6001efc6879ad1a2b1003d1e8039156bd054500588d508a3fda65a0808c33fa3aca17ed2761b5e15883d51cac9a6dca210733f6c9736703ea0388d8c9f3640e37b8823b2994e7c1f39586e7b04b78911f7edd45b09349dff329105c50b9be0fb2c56c1d0ce39e6a459ff23c134bda43a28183a4d50721dfb0748cc263ea8bbc1c1a2aaab743b2dad532f94257f9fd89b2e6128331b192eebeb72c7fcc34b744e96e1b47482e52630f048772eb8620a7a317e1654b44de962606c3ac86ebe219820c28c2d8a151a66ebf5df4fc9366a00e7132dd69e375b8aa3a841e2fbd19b2a2a63c9cf895cf6d840c38f4bc0f8828a59e53a6f95f64879b024d436320a6e7ce20a2940f453bb559fc05e4910b7a0e3133f038871ca8a9c62ba13dc27a4a08f8509ddfbf421c50b287f9b2b5dfc8d4613c9f2004e1b04712b488c154d95257d4f8aeca8eaf68d50a04c30078bf777e9465aa69ca8e09f755b5f27741884e09f3fa72a75ac4de6c7237e7ca818301a78f2a34f78224f15c3e3f2bb40a64cd59917f38c6e3da011d3698401a0af6320d9d7549ba25f5c682cdb45fe81fd2ec855e3c98c2c654ae7698812e64ad0322270c8d9c48299efd6e029d996cdb98fb7d50796d2c6fdf2f8f528d38a6ca98b5aa7f77aa5cccc258e1920bd7a4adc5b147c75dca9502c7bd19fa1956e0767041ee4310ad7425647643203ce709ce14e672f52c06a3ca7621e2fe93e942020cc08e885d915dc4fc838e380b448f766907d3d1a68c6e13d31c671c54ba3b956d60bc3840c7d8f499bac4c3f2629819ec8a5b13e410f5a0e40ad2b61f4a26047c2f6e5d208cde1455114341c8c66c7b64cf6d8eb36202d3679835076987da8ae2df0b0f38fadb24bb5f1e46e7e86856b58d4c6197076c59481649d0134bc85e683efe50d575f24a5aedeb20bf610a0d7f0469c61fb0735f1dc7ca28549c003388640bf43b8259560034a1afb8dd8f2e5b02d4ec789aa93bc809330df4d9aca8b5dc9dfee41e323381bedff3ef5f9c814644c1b4aa2261908fad2e149b5e2f9eab5f743dd9d0fc5695b66bd1269923253db52b5c6e67f5a277c78547b7bfc29ffebc999ad68141e8990c57f9b230703df426528ab1106a0f16a2e23d85f03112dd0916550483f651999bb6a1a062e9f8bf20035274edb06ec4074ed10ce71ea7a2052fe9779b1a55057b95e4f362bd46bb53ed8effb49c13501a7b3f57bd5777e572f0917eebe92f8c116e50a8974a44c4fbc75bad08ba2d311c01a6309a9e481f89ee7900c71c4e098f38fe68e490a1b0c003e70fa00491a32ff7ffe3bfe9c974eda8df60897af169152d701adbed98818267f666d2dd1e347cb6d987836f122ff291ff21602cde2d14376229b8d411760f7e0d27bb021c34aee56833f95a92b353e236fe64585767027ad264736df28b20ada0c69c9751051c4eed0f9b36264764c1b8f8a681849fe5da22d1148b5b8b6c1d030802e11108286ed52258fb18e39ea5da350ded3c57f834ee153aae06d424c0741fa986be0eb395d00880e95a3aad7323ffe90324e507377bb816b5239e150a5be01b558076f86a29de4564ba1739ec4b205d799896de427683d723b07fb944a72ded0fbc3bf33db30ae43cb7b571241823760d43d805dff408d8b47ac27aadd29a06680048ec4548488ee91cc11f1d2473ddb469b2e671b0b6403b5e88e26c6c31736ce2999e1c8707e556c0678c91a0e14207987d42b39eb1efda14af7c5438f68db964e476e45abdf2173c406450438329f56d0a2fcfa4d94e06d9a72d1a01e761b3662f213acf7e74b6e6668714e9231ff2a785a6bbf7ca8eb981391c414a43a1e2498dd2e3cefc8dcd4138196b01213a3672dfe81c5e24beea415db5434ffc96ae6ce9860cc03c34c959564852aa451c002c747a84bc692bb6171f6609d18be59b7afc6a4eef2b7aa6a3e027bfd0dd3203fe9ccee22c6a5e7358e069c49d5b9a5c803b790bd866c4fa00c9961e592b243e9957f294de25f4ecfbe7c8c398f5d3e4c14b16e6eceb1770568ff264256da45b7d7beec148aaf5d59470beae1cd90fe104742e25c96e1db810c18983eb581a92e8f3f7eec52e523a2bcc3ee83ea99b6f48a48ee8f4395037f9ae8df564f012dbc2f41d755d3f5e93c80c444b5ff387bb988cf21fa364b3077bb74ffc8a8b62631c7b4ca155ab6c0d3878ce7d8bcc003e27243c80338b39a0e983cb0b72aa60701f6dc5351d87c09f3340a61692bc33567b11c55050578f419da54ffc41a444fe057f546861439a37547a03e92946ec7d1548b3678447af41fd7bd11f02880d7a2b50c68d2ff3b6d6220ffd3ab7e3be531c16fba40485656756f7963409ab48c6b4887057210314cbce359a0a3e02b1e24d4cedc29d6f1f5f27a95aecc381f908c9c872929ef3904b1e7b8a4e5440c334d265d6189f8e1fbffcde5cf9ce6a429877e2c694a9a091de37da1620a1c857d6dedc21baf9b96b09ff9ce0470bb4b6df375e8472f1dceddb0a745c608f6b681324af3965bddc286b64e72978bf2da7e16e8f0ea2d5f39001906e23bc2dfdf844fcba97d3a93b022c64c51a6f6ecdc398ab69e7db4223555e4055e80401f063d55486521fe30f9f0cefa7a0f999bcb190509ad16a399e5e58f8cacf41e3a367bb2d36ba23d6d60a80addb9eed1c493993f2bbf4bb321301208b19cd2b62a46a5707fe448579adc0f80e3b7b0e5bf21a3123043359d8c36fa6c50c3ad620a049a5a03a85409365dc6e221698345f4a02ee56b7d1aa3bc915366e8da33c68b92d73f5241751ce199a342b362b6b1b8654c1c191580272edf178a066a2fa4558c6d2d3f0fe9f0b6eaaa297dde86f5bd606f12ec1710fe0ee9656e1b860893cef99782a5e35616e195d345afcd881ce33b6e58f03707210b3b1bcec13853641cf1ebc559ca4c810e3bbb0d319e20f044890d138f4996cf1fb752df893ad59190a2d1c4d2a52dc04926b5efcde4b4d0414cc36c971fbaf5f31a3670923e2f0ed21784a1d42aa84defca5ca1048c759cd4616842679d80fcf42e333097c592aa92c7750b83f4c38366bb3faa456253fc5d31479c4cd33521d3a4cf448b4520dca8f488542f85493a168150d5c04f87c8a75ae5f24f492f6843d9d20e8360fb18b4bc718271a2f55f1db1b12a24faca5b4763348c4bba1375574efbc442860d34ed9e960e8cd456c87d8454860369aac959e2f7b5b44581fa2203a78d821e816620db8443e1c941e6ef04dbdf04c95341b35e853409cf0c454fe546bafd54b3cc28168894b651c00002073be9b390d53a0946786af1c314e78b2b1e38ae93a93d75c2f6fbd6abf93165d0564cad8eab90dcfe9646ac1ad54a8e26d65c3593edaa86c27e0d602d7b98b77ad084e329ca22e9502e6c91bf580887f0e362843f4e557b59b033ece4d813ad17f480823ebc7f87cb522caa00a8e6b9bba04509c5a373039a8790016ed2661ac372c9be9bdfbca7c1fa92024629e31ffc10dc82b46dc2ff220cb85df2879dc8ece4b0c87231c0ab4dfc9d41bd56168f30b963c7f6b1f5a2edd3b4719412ae5167cfdf7bf26ccd5690b1c651c171e2fe78f1a549b0ccb5cdf33dfb5e084eb758e8e6c8f7066376074ec1f0c0fb6cfe78426ac4ba3790dfd38a9dd7757febeedff327f91cb4066c317532a2aa3678efdf1a914153e2352bc67673b779dbb3cbd236559c163588669de5d4e313e6a9081acb3f71d3b622798974803c290230b6df616c852abdb0d0e5f41b6e45684f87d4d34891bd378ee714d5168736de41674342fd1401a52f93de896d407d82b3f8cbfff67eba57d04c22589025d2d7c1f20c6fab6d2abd95e5bfc6071eafbc64c68050340508eea9b1d32c63cfbdab9318ad7c9d1468f751412367657356ddef7bcbfc1d7c765a1dc38821597f910541bdd2cfdbffc51bf30e26ea891f88a7b5e55321ac5b259cce14c1dee5e04c9bfb87634f4db1f4d179740fb2e68d458e7192912af76a28f21e183379d13292b65a89af2a6d8fbf8593d7420817e89289f4433ddab86a802ae8f40ac883be7600fff67434a094aafeac8e0ebe2c28fcfad5d6ce79c4d7ba989ba9422229b6ac54cc980cf6ab433b27f8d5d80ea98a0b3648809b261c69dadd89d9e66d89d2c00668518e0fbdfc219371972e8d3f084a4bc6cd93627aaba8aae2a555d58543eb76b319c8214ca40d66e7ad4bb99e3c40a7224f18e2cce00117671ca83dd4674c2b541b4051d5182ed31193020198f58f15b31a0891df2154b74ccc9bd49a51582ef19c93c07c9fba32daa48fda4d03803aebfb787214e4c4698ef6a9ae7a8a8e5a0dcfa9c5ea6af6045875d6bb70e82676", 0x1000}], 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000017010000040000000600000000000000b0000000000000001701000002000000960000001c6b447fcd2c3a7e75dbbfdc5ab2c9652f1613efe9cceab9698d3586707a35c415bd887ca43846aa0dba335cecf83e84824bba8a314bb22ebeb541bbdd1e0fa3f80312eab1185245da77ba657bcc06cc5f76e61f09f7252774c31f391ee049bb4e1910330939f5486c1f5010df57bf380ea245b9e3fe169803e8fe91e03111808b2ab8982a947e00000000000018000000000000001701000004000000040000000000000018000000000000001701000003000000000000000000000018000000001a000017010000030000000100000000000000180000000000000017010000030000000100"/296], 0x128, 0xc000013}, 0x4040000) sendmsg$TIPC_NL_MEDIA_GET(r9, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r11, @ANYBLOB="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"], 0x27c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1a000) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0xd) write(r7, &(0x7f0000000040)="e0", 0x100000098) 14:19:06 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 14:19:06 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x31], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1441.257441] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1441.263731] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.264489] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1441.275386] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.300050] kobject: 'loop3' (000000006ef824eb): kobject_uevent_env [ 1441.328707] kobject: 'loop3' (000000006ef824eb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1441.357514] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1441.364612] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:06 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r0, 0x40049409, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r7 = inotify_init() r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r8, 0x40049409, r9) ioctl$TCGETA(r8, 0x5405, &(0x7f0000000340)) r10 = getegid() r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r11, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r14, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000400)="117c50d7cd7d835a67458d14c625baed9d92b8dd25beb097b63ad72b920500a91ec8068084bd955318a9e8f7f09dc298ac0cfe05962c68d5d900bbf3f0777f15a057984ef8d133642af95fae2dd0eec7a21fb6bc982e22dd571630f55dad72e3135622fa9b3b0b1c296341b1ece39a9093eef7aa4040ac963a72d0272becb1ffecd917d8c0283127319a1c4365193aa499ab5c54d781a5", 0x97}, {&(0x7f00000006c0)="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", 0xfa}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32=r7, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="a72038bfa8232f3d762a15aed2cbb6db8409c848b8b7deae1a23dd8abfbad18d560f2f26addd41ec85d9920e83a00084083836a63b6fbecc8158a6edf293072632e1c00fb22c9e7371deab30b314ff1c54ecb40b123be6c6449d69044301c72922721349f96c700594f75d3c378aff9e92727ca9fbaa6c37a04ba43420180a3cfeec79822e130475fd6fc6823d7f7d5b8f723a64b3b890a3c180277e5412b45abd77e61990a75916aee3005817ef3938f40bdec0d55c58794d8e6c", @ANYRES32, @ANYRES32=r13, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r7, @ANYRESOCT=r12, @ANYRESOCT, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC=r11, @ANYRESOCT]], @ANYRES32=r4, @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0080970f5afd6ac6fb4e2989b5fa6f0000000000000003ae6081e87ed03df65b4a38c114bd69588206c409559cfff399d61266e14f523d013edb9e5db48b08f49e4d82", @ANYRES32, @ANYRES32, @ANYRES32=r10, @ANYRESDEC=0x0, @ANYRES32=r14, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100aa4402375e7c9670a019fb0d0100020000", @ANYRES32, @ANYRES32, @ANYBLOB="00000000b73e2371b076898e41934867f3233fe4aba3b11fccc1b21f6dbced6eeae3"], 0x209, 0x40000}, 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x8805b009059d60d8, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r10}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, '^vmnet0proc$-'}}]}}) r15 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r15, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r15, 0x0) syz_emit_ethernet(0xd, &(0x7f0000000000)={@broadcast, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xfff, 0x0, 0x6, 0x0, @dev, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x0, 0x2}}}}}}, 0x0) 14:19:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a7f01000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1441.404608] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1441.425633] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.440956] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2, 0x0) write$cgroup_type(r5, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r8, 0xae9a) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f00000001c0)=""/243, 0x96af}) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f0000000080)={0x20001, 0x0, [0x4, 0x80000401, 0x3, 0x8001, 0x7, 0xb94, 0x4, 0x1000000]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000400)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/248, 0xf8}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f0000001580)=""/139, 0x8b}, {&(0x7f0000001640)=""/196, 0xc4}, {&(0x7f0000001740)=""/33, 0x21}, {&(0x7f0000001780)=""/107, 0x6b}, {&(0x7f0000001800)=""/121, 0x79}, {&(0x7f0000001880)=""/55, 0x37}], 0x9}, 0x40000000) bind$xdp(r5, &(0x7f00000019c0)={0x2c, 0x6, r9, 0x2}, 0x10) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000003c0)=0xd) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r11, 0x891c, &(0x7f0000000340)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) getrlimit(0x7, &(0x7f0000000000)) write(r1, &(0x7f0000000040)="e4", 0x9a8a687f6e2a3bc2) [ 1441.456863] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.457465] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.487649] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1441.494416] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1441.523103] JFS: discard option not supported on device [ 1441.535013] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1441.546423] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.547738] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.552854] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.582511] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1441.589310] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.599982] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.611320] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.621211] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:19:07 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x0, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1441.632258] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1441.646617] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1441.657089] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' 14:19:07 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xffffffef, 0x1, 0x0, 0x0, 0x6, 0x0, @dev, @empty}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 1441.691474] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.698577] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x125000, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x1a1) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x20400) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) gettid() ioctl$FICLONE(r3, 0x40049409, r4) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x80d) write(r2, &(0x7f0000000040)="e0", 0x100000098) 14:19:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0003000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1441.736501] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1441.753445] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1441.781696] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1441.800106] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1441.816292] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env 14:19:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x4) setresuid(0x0, 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4639652408737230007a8dcf406860ad5d20562b1241fbe12e22482703603d0ec00a40228505e9e9f474dbc675097a391520494e5f55d1e71855e59ead3bb1ecdb4e9c744633eb38daea0530041edef51f"], &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_open_dev$loop(0x0, 0x0, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1441.834002] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1441.855949] JFS: discard option not supported on device [ 1441.870927] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1441.896905] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1441.897183] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1441.991108] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1442.021191] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.045574] kobject: 'loop3' (000000006ef824eb): kobject_uevent_env [ 1442.083193] kobject: 'loop3' (000000006ef824eb): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:19:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a8004000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1442.083214] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1442.106769] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env 14:19:07 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x0, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1442.139469] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1442.148191] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.162465] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1442.186465] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1442.187060] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1442.209938] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.216959] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1442.223907] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env 14:19:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f0000000140)) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r2, 0x40049409, r3) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000200)=0x54) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$FICLONE(r7, 0x40049409, r8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001a80)=0xe8) ioctl$HCIINQUIRY(r7, 0x800448f0, &(0x7f0000001ac0)={r9, 0x8, 0x1, 0x7f, 0x36, 0x0, 0x9}) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000000c0)={0x200, 0x1f, 0x4, 0x0, {r5, r6/1000+10000}, {0x3, 0x2, 0x1, 0x7, 0x6, 0x0, "5b39a291"}, 0x2, 0x4, @fd=r10, 0x4}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0xd) write(r4, &(0x7f0000000040)="e0", 0x100000098) [ 1442.239032] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.254292] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.261864] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1442.283303] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1442.315866] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.332995] audit: type=1804 audit(1575814747.689:772): pid=15284 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/" dev="sda1" ino=24 res=1 [ 1442.333517] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env 14:19:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0005000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1442.417725] JFS: discard option not supported on device [ 1442.426778] jfs: Unrecognized mount option "subj_role=/dev/loop#" or missing value [ 1442.438428] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:19:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x5) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd) write(r2, &(0x7f0000000040)="e0", 0x100000098) [ 1442.501195] EXT4-fs (sda1): re-mounted. Opts: (null) [ 1442.510640] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1442.520990] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.542379] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.553837] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env [ 1442.565066] kobject: 'loop2' (000000007ae82a36): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1442.565366] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:19:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0006000100000018"], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$nl_route(0x10, 0x3, 0x0) pivot_root(0x0, 0x0) [ 1442.611201] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.645356] kobject: 'loop4' (00000000b2b2cf83): kobject_uevent_env [ 1442.652437] kobject: 'loop4' (00000000b2b2cf83): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:19:08 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000340)=0x80) socket(0x11, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x8001}], 0x8, &(0x7f0000000600)={[{@errors_continue='errors=continue'}, {@discard='discard'}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bdevwlan0vboxnet0-trustedeth0'}}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x62, 0x65, 0x65, 0x0, 0x31], 0x2d, [0x0, 0x64, 0x0, 0x62], 0x2d, [0x0, 0x24, 0x30, 0x35], 0x2d, [0x35, 0x0, 0x0, 0x65], 0x2d, [0x70, 0x10, 0x62, 0x33, 0x61, 0x39, 0x30, 0x33]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+@user}.@cgroupuser\'\\\x00'}}, {@euid_eq={'euid'}}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 1442.682313] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1442.702141] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1442.711661] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.758712] kobject: 'loop1' (000000005fa0eb76): kobject_uevent_env [ 1442.779709] kobject: 'kvm' (000000008d0aed20): kobject_uevent_env [ 1442.798489] kobject: 'loop1' (000000005fa0eb76): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1442.810420] kobject: 'kvm' (000000008d0aed20): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1442.845195] kobject: 'loop2' (000000007ae82a36): kobject_uevent_env 14:19:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000700010000001