[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.460652][ T26] audit: type=1800 audit(1572210195.234:25): pid=8549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.488417][ T26] audit: type=1800 audit(1572210195.234:26): pid=8549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.531826][ T26] audit: type=1800 audit(1572210195.234:27): pid=8549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2019/10/27 21:03:23 fuzzer started 2019/10/27 21:03:24 dialing manager at 10.128.0.26:34793 2019/10/27 21:03:24 syscalls: 2534 2019/10/27 21:03:24 code coverage: enabled 2019/10/27 21:03:24 comparison tracing: enabled 2019/10/27 21:03:24 extra coverage: extra coverage is not supported by the kernel 2019/10/27 21:03:24 setuid sandbox: enabled 2019/10/27 21:03:24 namespace sandbox: enabled 2019/10/27 21:03:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/27 21:03:24 fault injection: enabled 2019/10/27 21:03:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/27 21:03:24 net packet injection: enabled 2019/10/27 21:03:24 net device setup: enabled 2019/10/27 21:03:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 21:05:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) r1 = getpgrp(0x0) r2 = gettid() r3 = socket$netlink(0x10, 0x3, 0x0) kcmp(r1, r2, 0x0, r0, r3) 21:05:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x2027fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b33c38f19c0400cd8034c5eb1a86f03717ef43203db29a05bc46"], 0x1c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000000), 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f9be9f303b222957eecbc624877c825255f910c28f5e87a64820548e39808e0b61a0ac073d90d86da58a5d5ab066f24351eda621e80000000000005dbc53ef7d10d8ea0000000000", @ANYRESHEX], 0x0, 0x5a}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syzkaller login: [ 190.713401][ T8716] IPVS: ftp: loaded support on port[0] = 21 [ 190.778461][ T8718] IPVS: ftp: loaded support on port[0] = 21 21:05:30 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) [ 190.905275][ T8716] chnl_net:caif_netlink_parms(): no params data found [ 191.049033][ T8716] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.071313][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.079137][ T8716] device bridge_slave_0 entered promiscuous mode [ 191.091359][ T8718] chnl_net:caif_netlink_parms(): no params data found [ 191.107544][ T8722] IPVS: ftp: loaded support on port[0] = 21 [ 191.128345][ T8716] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.137548][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.146976][ T8716] device bridge_slave_1 entered promiscuous mode 21:05:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="785cf25db991075e4834d9cda3d9bb8a", @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xdc}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) [ 191.191963][ T8718] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.199071][ T8718] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.208198][ T8718] device bridge_slave_0 entered promiscuous mode [ 191.226626][ T8716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.252706][ T8718] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.259794][ T8718] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.272463][ T8718] device bridge_slave_1 entered promiscuous mode [ 191.300507][ T8716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.367376][ T8718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.393022][ T8716] team0: Port device team_slave_0 added [ 191.404341][ T8718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.436643][ T8716] team0: Port device team_slave_1 added [ 191.448052][ T8724] IPVS: ftp: loaded support on port[0] = 21 21:05:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) [ 191.516118][ T8716] device hsr_slave_0 entered promiscuous mode [ 191.583786][ T8716] device hsr_slave_1 entered promiscuous mode 21:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x400000000}) [ 191.718476][ T8718] team0: Port device team_slave_0 added [ 191.739688][ T8726] IPVS: ftp: loaded support on port[0] = 21 [ 191.786455][ T8718] team0: Port device team_slave_1 added [ 191.844140][ T8722] chnl_net:caif_netlink_parms(): no params data found [ 191.923252][ T8718] device hsr_slave_0 entered promiscuous mode [ 191.961668][ T8718] device hsr_slave_1 entered promiscuous mode [ 192.001228][ T8718] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.035182][ T8722] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.043163][ T8722] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.050780][ T8722] device bridge_slave_0 entered promiscuous mode [ 192.058495][ T8722] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.065622][ T8722] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.066392][ T8722] device bridge_slave_1 entered promiscuous mode [ 192.083072][ T8729] IPVS: ftp: loaded support on port[0] = 21 [ 192.117294][ T8722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.139734][ T8722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.166281][ T8722] team0: Port device team_slave_0 added [ 192.188896][ T8722] team0: Port device team_slave_1 added [ 192.289252][ T8726] chnl_net:caif_netlink_parms(): no params data found [ 192.345992][ T8722] device hsr_slave_0 entered promiscuous mode [ 192.401588][ T8722] device hsr_slave_1 entered promiscuous mode [ 192.461180][ T8722] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.508909][ T8729] chnl_net:caif_netlink_parms(): no params data found [ 192.606086][ T8726] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.613407][ T8726] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.621699][ T8726] device bridge_slave_0 entered promiscuous mode [ 192.629221][ T8726] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.636392][ T8726] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.644177][ T8726] device bridge_slave_1 entered promiscuous mode [ 192.663302][ T8729] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.670393][ T8729] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.679574][ T8729] device bridge_slave_0 entered promiscuous mode [ 192.687027][ T8724] chnl_net:caif_netlink_parms(): no params data found [ 192.727112][ T8722] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.734411][ T8722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.742203][ T8722] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.749279][ T8722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.758466][ T8729] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.766027][ T8729] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.773958][ T8729] device bridge_slave_1 entered promiscuous mode [ 192.789569][ T8718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.797492][ T8724] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.805061][ T8724] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.812994][ T8724] device bridge_slave_0 entered promiscuous mode [ 192.822696][ T8716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.849002][ T8729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.866120][ T8726] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.875923][ T8724] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.883591][ T8724] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.894837][ T8724] device bridge_slave_1 entered promiscuous mode [ 192.902915][ T8729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.922335][ T8716] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.930801][ T8726] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.951326][ T8724] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.964578][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.972722][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.983787][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.992243][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.036408][ T8724] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.054189][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.064860][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.074433][ T2948] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.081504][ T2948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.089182][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.098030][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.106511][ T2948] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.113609][ T2948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.121286][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.131879][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.139513][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.147633][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.177594][ T8718] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.194821][ T8729] team0: Port device team_slave_0 added [ 193.201417][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.214006][ T8729] team0: Port device team_slave_1 added [ 193.220760][ T8726] team0: Port device team_slave_0 added [ 193.227741][ T8724] team0: Port device team_slave_0 added [ 193.248352][ T8726] team0: Port device team_slave_1 added [ 193.255575][ T8724] team0: Port device team_slave_1 added [ 193.263372][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.273202][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.281659][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.291558][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.299898][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.335905][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.348602][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.357783][ T2948] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.364885][ T2948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.372569][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.381278][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.389650][ T2948] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.396753][ T2948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.404914][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.415252][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.423951][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.432638][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.440921][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.449271][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.457616][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.466262][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.474754][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.483404][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.491962][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.499851][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.516336][ T8716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.528334][ T8716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.573447][ T8724] device hsr_slave_0 entered promiscuous mode [ 193.621662][ T8724] device hsr_slave_1 entered promiscuous mode [ 193.691169][ T8724] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.700820][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.712689][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.727878][ T8722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.802921][ T8729] device hsr_slave_0 entered promiscuous mode [ 193.841458][ T8729] device hsr_slave_1 entered promiscuous mode [ 193.901240][ T8729] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.917250][ T8718] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.928820][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.951777][ T8716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.965695][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.978447][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.019862][ T3533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.028242][ T3533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.084425][ T8726] device hsr_slave_0 entered promiscuous mode [ 194.131347][ T8726] device hsr_slave_1 entered promiscuous mode [ 194.171097][ T8726] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.184250][ T8722] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.226652][ T8718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.236517][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.253073][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.267339][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.274481][ T8733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.309891][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.318905][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.334544][ T8734] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.341693][ T8734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.376979][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.405515][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:05:34 executing program 0: [ 194.427759][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.437275][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.446311][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.455489][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.464492][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.474687][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.483461][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.491926][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.502813][ T8734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.522847][ T8722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:05:34 executing program 0: [ 194.562832][ T8722] 8021q: adding VLAN 0 to HW filter on device batadv0 21:05:34 executing program 0: 21:05:34 executing program 1: [ 194.689117][ T8758] ptrace attach of "/root/syz-executor.1"[8756] was attempted by "/root/syz-executor.1"[8758] [ 194.767069][ T8729] 8021q: adding VLAN 0 to HW filter on device bond0 21:05:34 executing program 0: [ 194.813799][ T8724] 8021q: adding VLAN 0 to HW filter on device bond0 21:05:34 executing program 1: [ 194.887287][ T8729] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.904862][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 21:05:34 executing program 0: [ 194.930137][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.959145][ T8726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.015407][ T8724] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.032625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.040502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:05:34 executing program 2: 21:05:34 executing program 0: [ 195.068607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.078611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.098605][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.105919][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.127812][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.143925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.163206][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.170380][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.186199][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.219706][ T8726] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.261109][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.276269][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.288361][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.302823][ T2948] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.309862][ T2948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.317978][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.325882][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.333810][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.342669][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.351070][ T2948] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.358108][ T2948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.366047][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.374827][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.383459][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.392418][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.400760][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.409379][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.418892][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.430116][ T2948] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.470629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.485346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.494415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.503512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.513028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.521618][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.528645][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.536282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.545117][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.553774][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.562497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.570816][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.577957][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.586213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.595516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.603961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.612695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.620858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.629396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.638165][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.647078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.655934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.665200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.674748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.682656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.690347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.705793][ T8726] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 195.717451][ T8726] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.735286][ T8724] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.747203][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.755298][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.764870][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.773843][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.782266][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.790340][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.798786][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.808213][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.816022][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.825044][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.842272][ T8726] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.859527][ T8724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.875594][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.938214][ T8729] 8021q: adding VLAN 0 to HW filter on device batadv0 21:05:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="785cf25db991075e4834d9cda3d9bb8a", @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xdc}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) [ 196.202710][ C1] hrtimer: interrupt took 57295 ns 21:05:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 21:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x400000000}) 21:05:36 executing program 2: 21:05:36 executing program 1: 21:05:36 executing program 0: 21:05:36 executing program 3: 21:05:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 21:05:36 executing program 3: 21:05:36 executing program 2: 21:05:36 executing program 0: 21:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x400000000}) 21:05:36 executing program 0: 21:05:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000140)='|', 0x1, 0x401c005, 0x0, 0x0) 21:05:37 executing program 3: 21:05:37 executing program 2: 21:05:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_ARP_IP_TARGET={0x10, 0x8, [@rand_addr=0x8000003, @loopback, @multicast1]}]}}}]}, 0x44}}, 0x0) 21:05:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x3ef) sendfile(r1, r2, 0x0, 0x12000) 21:05:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x20, 0x0) 21:05:37 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 21:05:37 executing program 2: io_submit(0x0, 0x2000005c, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x401}]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 21:05:37 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000000580)="cae1b4b142491c1ef89a0e5b23") [ 197.693299][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 197.693312][ T26] audit: type=1804 audit(1572210337.474:31): pid=8863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir112380917/syzkaller.jiU0ZJ/3/file0/file0" dev="sda1" ino=16554 res=1 [ 197.757964][ T8870] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:05:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000002c0)="dc71466d362ea2d85b286d3bf0decc35aa625ee811b02ff2a7f3e4d9c082003e194b537416a7bf03e295bd", 0x2b, 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="f5e8593220a886334849"], 0xa) 21:05:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="cdde971bffb5da6dae0c5035577d2bcf49badcec9494bc7c0c2431f64201154493d22a56e66874050003f1cfb40d0d563aefd1c7176a46fe83b3e78f585782d282d4f9496c6b7382b1e4972323ca549c828f8e8cde1b0433c21aa837ab70b33acc8f36fb99b47a44e50c3b8ddf38f6", @ANYPTR64], 0x0, 0x77}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f00000001c0)=""/127) sched_getscheduler(0x0) 21:05:37 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="ad00000080000000416dede3d07293ffb029b3e4a2d1275c7d5ab92d07051affa5c91f7eec7481f2dc30f491a460a9c6ab66df1893ba59f013b0e92e4546c89d08f7995584005979fe9eb94947d2fe9dca76c7dcea501c81094e56bb77959a8d450518347970ea1395966e180f23c4a85de82c50bc1a4d2a9ac296fa831e6a8b44fe458a0c8e6767ef45f5238ce6439282c55ff52f3043a9ffcc4c92c6e6b0e1ca4535538628a00bb7cac34deff3dd7c591217db302161f5e3b5856eb3a7478e2aeb3438a969eea21008077b69f7af7956ef20ec8ffa9a1acb86dc2943372d69e2d54730a04f792b75aef1d4"], 0x200000) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xeb, '\x00r%', "0144cd0250f34ca7b07915472cd0719e13da163aaf4d978c8c8df1f45a29570e701824fbbd9e1ca4f565138b96f339a5f67c36d6d24b0bf255a5caaf6e5521072ff76b84fa3f0865bf669c750e19842e0f8ea8d15cf45827268b2d2a46b7dcb62f1324ff936f9ef9fd172f610b69d8ff0f8cfb906e6ded837e0f5975172bf2fe880c5b30a6affbb7acfb123974fb65ac6f2e86a6ef52fb99dafd3bb78b75e3fb04768ab142593285c9b774d73aa1bd208eb596eadac041aa80714bce08b5b8af68d9465d32d05809eff8a6cc23d94208a002462d733e623640a0ba4a083ce1ae9d5b36c946d727b792807b123e4e1380ec24576947cbe60f6fb5fe9576730ecb"}}, 0x110) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) socket$inet6(0xa, 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x172) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400)=0x2, 0x4) [ 197.872395][ T8873] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 197.881728][ T8873] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (1) [ 197.894141][ T26] audit: type=1804 audit(1572210337.494:32): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir112380917/syzkaller.jiU0ZJ/3/file0/file0" dev="sda1" ino=16554 res=1 21:05:37 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000000580)="cae1b4b142491c1ef89a0e5b23") 21:05:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1}) 21:05:37 executing program 2: socket(0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000240)='./file1/file0\x00', &(0x7f00000000c0)='./file0\x00') write(0xffffffffffffffff, 0x0, 0x0) 21:05:38 executing program 5: syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x6) fchdir(0xffffffffffffffff) fcntl$setsig(r0, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r2, &(0x7f00000017c0), 0x331, 0x0) 21:05:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f00000001c0)=""/189, 0x9}) 21:05:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000280)=0xff, 0x4) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x44e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20045000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000000280)=0xff, 0x4) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x44e20, 0x80000, @loopback}, 0x1c) [ 198.390859][ T8886] syz-executor.1 (8886) used greatest stack depth: 22280 bytes left 21:05:38 executing program 2: unshare(0x20000200) clone(0x6fc8f86079a094ba, 0x0, 0x0, 0x0, 0x0) 21:05:38 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) 21:05:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x296}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffc01, 0x80000000}, 0x2008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000002c0)=0x4) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1, 0x5, 0x0) r4 = epoll_create1(0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x400000, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000080)) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r2) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_DIRENT(r7, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x150) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000200)=0x17) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) [ 198.658626][ T8925] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:05:38 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200005) sendfile(r0, r1, 0x0, 0x8000ffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 21:05:38 executing program 3: r0 = gettid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pause() prlimit64(r0, 0x0, 0x0, 0x0) 21:05:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="cdde971bffb5da6dae0c5035577d2bcf49badcec9494bc7c0c2431f64201154493d22a56e66874050003f1cfb40d0d563aefd1c7176a46fe83b3e78f585782d282d4f9496c6b7382b1e4972323ca549c828f8e8cde1b0433c21aa837ab70b33acc8f36fb99b47a44e50c3b8ddf38f6", @ANYPTR64], 0x0, 0x77}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f00000001c0)=""/127) sched_getscheduler(r4) 21:05:38 executing program 2: io_setup(0x40000000008, &(0x7f0000000240)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) 21:05:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) fstat(r0, &(0x7f00000004c0)) r1 = socket(0x2, 0x10000001, 0x84) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ff0f"], 0x10) r2 = msgget$private(0x0, 0x12) msgsnd(r2, &(0x7f0000000240)=ANY=[], 0x0, 0x801) msgsnd(r2, &(0x7f0000000500)=ANY=[], 0x0, 0x800) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000140)=""/10) r3 = msgget$private(0x0, 0x80) msgget(0x0, 0x4) msgsnd(r3, &(0x7f00000011c0)={0x6, "64b8639f165b93a40e9835e493b3796298bf964ffd000b38e6fea0cd2a4d44dcb525bec665b0ba6abbabb833bfdb60247665216ad661e977b0169e00a21cfe2029e55d3f7eaeaaea5a92ffc4c8f1fc3e0dae828e0f28acb622787cb9dfd8b30232b05eddc4e3466193c33e704bb80fa6ab94abbc4202cd024860e44601d1b97208101150cf22ad2a2c4852416ea9616fbca9875532ef5e7077bc660fca8a3e5fbd25a9c226448df3482606f7d2cfa1c0cedac3630d43407a3eb9d2bf31dfda5f3a30a686a86107b1f399df77708cf2c73e826bc1e0fd7ce29424f0c99cc98ef13b1192f176aa24"}, 0xeb, 0x1000) 21:05:38 executing program 4: 21:05:39 executing program 1: 21:05:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x101201) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 199.398850][ T26] audit: type=1800 audit(1572210339.174:33): pid=8947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16553 res=0 21:05:39 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x6c002, 0x0) 21:05:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="cdde971bffb5da6dae0c5035577d2bcf49badcec9494bc7c0c2431f64201154493d22a56e66874050003f1cfb40d0d563aefd1c7176a46fe83b3e78f585782d282d4f9496c6b7382b1e4972323ca549c828f8e8cde1b0433c21aa837ab70b33acc8f36fb99b47a44e50c3b8ddf38f6", @ANYPTR64], 0x0, 0x77}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f00000001c0)=""/127) sched_getscheduler(0x0) 21:05:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x48}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24004010}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb}, 0x1c}}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) [ 199.708815][ T8983] ptrace attach of "/root/syz-executor.1"[8982] was attempted by "/root/syz-executor.1"[8983] 21:05:39 executing program 1: [ 199.799993][ T8987] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:05:39 executing program 1: 21:05:39 executing program 3: 21:05:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="f95a0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="cdde971bffb5da6dae0c5035577d2bcf49badcec9494bc7c0c2431f64201154493d22a56e66874050003f1cfb40d0d563aefd1c7176a46fe83b3e78f585782d282d4f9496c6b7382b1e4972323ca549c828f8e8cde1b0433c21aa837ab70b33acc8f36fb99b47a44e50c3b8ddf38f6", @ANYPTR64], 0x0, 0x77}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f00000001c0)=""/127) sched_getscheduler(r4) [ 200.137915][ T8999] ptrace attach of "/root/syz-executor.0"[8997] was attempted by "/root/syz-executor.0"[8999] 21:05:40 executing program 2: io_setup(0x40000000008, &(0x7f0000000240)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_setup(0x40000000008, &(0x7f0000000240)) 21:05:40 executing program 1: 21:05:40 executing program 0: 21:05:40 executing program 5: 21:05:40 executing program 3: 21:05:40 executing program 4: 21:05:40 executing program 0: 21:05:40 executing program 4: 21:05:40 executing program 5: 21:05:40 executing program 3: 21:05:40 executing program 1: 21:05:40 executing program 0: 21:05:41 executing program 2: 21:05:41 executing program 4: 21:05:41 executing program 1: 21:05:41 executing program 3: 21:05:41 executing program 5: 21:05:41 executing program 0: 21:05:41 executing program 0: 21:05:41 executing program 4: 21:05:41 executing program 1: 21:05:41 executing program 5: 21:05:41 executing program 3: 21:05:41 executing program 2: 21:05:41 executing program 4: 21:05:41 executing program 1: 21:05:41 executing program 0: 21:05:41 executing program 5: 21:05:41 executing program 3: 21:05:41 executing program 2: 21:05:41 executing program 1: 21:05:41 executing program 4: 21:05:41 executing program 5: 21:05:41 executing program 0: 21:05:41 executing program 3: 21:05:41 executing program 2: 21:05:41 executing program 4: 21:05:41 executing program 0: 21:05:41 executing program 1: 21:05:41 executing program 5: 21:05:41 executing program 3: creat(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r0 = msgget(0x0, 0x1e8) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000002c0)=""/98) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xf0d741) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x2, 0x8}, {0x2, 0xffffff7f}]}, 0x14, 0x2) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000140)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000340)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 21:05:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) bind$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 21:05:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') readv(r0, &(0x7f0000000480)=[{&(0x7f0000000b40)=""/123, 0x7b}], 0x1) 21:05:41 executing program 3: syz_emit_ethernet(0xac, &(0x7f00000018c0)={@broadcast, @random="f96c2819c74e", [], {@ipv6={0x86dd, {0x0, 0x6, "251000", 0x76, 0x2c, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000, 0x0, 0x0, 0x300]}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, [], [{}, {0x0, 0xd, "6c09213fa14ff629cabccb560dafabae5cf1168b0bf008a05acde2034386aa78c4f7c6816325b085dbe9a9b2aa9307397803493e8e12c8e23dff5df9aecbe3e9cb9fd29587bc3a6fd426e32d20f512f0e31662e5fb0ab8d383644a9ae5bdf22d26a5e8de46bbc7f2ed16"}]}}}}}}, 0x0) 21:05:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) close(r0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) 21:05:41 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 21:05:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d83", 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 202.349184][ T9109] debugfs: File '9100' in directory 'proc' already present! 21:05:42 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 202.446060][ T9109] binder: BINDER_SET_CONTEXT_MGR already set 21:05:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) [ 202.493153][ T9106] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value [ 202.509203][ T9109] binder: 9100:9109 ioctl 40046207 0 returned -16 21:05:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6000000000900000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 21:05:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 21:05:42 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) bind$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 21:05:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) 21:05:42 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x2, 0x1, 0x9, 0x4, 0x0, 0x5}, 0xd0}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 21:05:42 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:42 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) 21:05:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="587ebaf11d1761bddc3232e305a90a79"}], 0x1c) 21:05:42 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 203.176632][ T9149] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:43 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x2, 0x1, 0x9, 0x4, 0x0, 0x5}, 0xd0}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 21:05:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 21:05:43 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) r1 = getpgrp(0x0) syz_open_procfs(r1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000140)={0x100000000}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="15000015ebd7000600000000160000003957323030302e4c95baddceea4a5ad4c44b38cd0f5524f4c7a5125a380acf262261d13d5a346e0840c3c5ee520964f82ee6a51afb42bce0dbfa4d728d7e42f91b2e20fe797b65c43a6c08d5a750aeda0f8e2837b6f73a36b81ba54596ac572fec54dfa483fc1151c0f9c9e4ca1f184a21e17b7d012cfee1a4123116150b789e5fee210eb8"], 0x95) r3 = dup(0xffffffffffffffff) write$FUSE_BMAP(r3, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1}}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x16, 0xf104340551378d4a}, 0x10) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r4, r5, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xfffffffd, 0xffffffffffffffff, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES16, @ANYRESDEC]], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r8 = dup(r7) write$FUSE_BMAP(r8, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1}}, 0x30) write$P9_RXATTRCREATE(r8, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r9, r10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r11, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r12, 0x0, 0x0) r13 = dup(r12) write$FUSE_BMAP(r13, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r13, &(0x7f00000000c0)={0x30}, 0x30) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='a'], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 21:05:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) bind$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 21:05:43 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x800000000000273, 0x0) 21:05:43 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:43 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 204.037700][ T9195] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:43 executing program 3: r0 = socket(0x10, 0x4008000000803, 0x0) sendto(r0, &(0x7f0000000600)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000000)=""/240) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/231, 0xffffffffffffff42}}], 0x57, 0x0, 0x0) 21:05:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 21:05:43 executing program 2: socket$inet(0x2, 0x4000000000000001, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x2, 0x1, 0x9, 0x4, 0x0, 0x5}, 0xd0}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 21:05:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) bind$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 21:05:44 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:44 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:44 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) syz_emit_ethernet(0xe, &(0x7f0000000600)={@empty, @broadcast}, 0x0) 21:05:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:44 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000000a40)=[{{&(0x7f0000000100)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x1, 0x20004000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @empty}, 'lo\x00'}) 21:05:44 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x20000005) [ 205.064354][ T9247] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:45 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:45 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$apparmor_exec(r1, &(0x7f0000000880)={'\\CB\xec\x1f\xb7\x06C\xc3MY\x1d\x9b;h\xc3\x16\xb1\xeeLFy\xeaU\x0e3\\C6\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x995\xe9^\xd4\xdd\xf4\x16\x1d\xb1\xef\xa4=\xe2q,\xbc\xbc\x8e\xc8iy\xb1\x18\x9c$\x15\xbfO\xa4s3I\xf3\x13b\x7f\xbbc\x88\xf6!\x1dq'}, 0x299) 21:05:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:45 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd605ea6a300143300fe800000000000000000000000ca35ad000000000000aa0000002d8bb3381634082f00f72c00", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="eb6130739ad0d44cb85069d359040023169238847a1bfc5057267f5741971f0c225991d8893f35273646316d17b40a8d5c1c99ac4af3e3507fb794eb9fc8cc8548db57faa32293a36f4deae4c99c7284aec3a6b8dfbe7870019c3f046613adefe6fa3a6e6e1c15a84c1f916b49434407d7cd4cbeb820c05e84200738ddfa4e6ed22be76c8e0d700996b3cb6b1ad14013c7dce56c053a2eff145a5b81ff28f6f753594d43"], 0x0) 21:05:45 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040), 0x4) 21:05:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) [ 205.386602][ T26] audit: type=1804 audit(1572210345.164:34): pid=9272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 [ 205.406377][ T9275] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value [ 205.416154][ T26] audit: type=1804 audit(1572210345.194:35): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 21:05:45 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/netstat\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x96a8) 21:05:45 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 21:05:45 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001080)=[{{&(0x7f00000004c0)={0x2, 0x4e22, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x18, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x4, 0x8}]}}}], 0x18}}], 0x1, 0x0) 21:05:45 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0xc080aebe, &(0x7f0000000140)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup2(r3, r2) setxattr$security_ima(0x0, 0x0, &(0x7f0000000140)=@md5={0x1, "bdc1aec15a2b7685089e9c1be49554ea"}, 0x11, 0x0) [ 205.715155][ T9301] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:45 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$setopts(0x18, r1, 0x0, 0x0) 21:05:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="44000000108c57768e0000000000852900000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040008000000"], 0x44}}, 0x0) 21:05:45 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:45 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 205.942397][ T9322] ptrace attach of "/root/syz-executor.3"[8724] was attempted by "/root/syz-executor.3"[9322] 21:05:45 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) [ 206.038336][ T9322] ptrace attach of "/root/syz-executor.3"[8724] was attempted by "/root/syz-executor.3"[9322] [ 206.061794][ T9323] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback={0x10000120, 0x3cec11fffe4fef91}}], 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 21:05:45 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 21:05:45 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:46 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r0) 21:05:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet6_int(r3, 0x29, 0x6, &(0x7f0000000140), 0x4) 21:05:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="93993974d566da0e3578d082d7ae73b9"}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000480)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) [ 206.691333][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 206.697353][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:05:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) [ 206.823787][ T9386] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:46 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 21:05:46 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x4e21, @local}, 0x10) 21:05:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/netstat\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x96a8) openat$zero(0xffffffffffffff9c, 0x0, 0x2a90d4113455100a, 0x0) 21:05:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:47 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:47 executing program 3: 21:05:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:47 executing program 2: 21:05:47 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:47 executing program 4: 21:05:47 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:47 executing program 3: 21:05:47 executing program 2: 21:05:47 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:47 executing program 3: 21:05:47 executing program 2: 21:05:47 executing program 4: 21:05:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:47 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:47 executing program 3: 21:05:47 executing program 2: 21:05:47 executing program 4: 21:05:47 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:47 executing program 3: 21:05:48 executing program 2: 21:05:48 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:48 executing program 4: 21:05:48 executing program 3: 21:05:48 executing program 2: 21:05:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:48 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:48 executing program 4: 21:05:48 executing program 3: 21:05:48 executing program 2: 21:05:48 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:48 executing program 3: 21:05:48 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:48 executing program 4: 21:05:48 executing program 2: 21:05:48 executing program 3: 21:05:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:48 executing program 4: 21:05:48 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:48 executing program 3: r0 = shmget$private(0x0, 0x200000, 0x0, &(0x7f000000a000/0x200000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000100)) msync(&(0x7f0000154000/0x2000)=nil, 0x2000, 0x4) 21:05:48 executing program 2: syz_emit_ethernet(0x48e, &(0x7f00000018c0)={@broadcast, @random="f96c2819c74e", [], {@ipv6={0x86dd, {0x0, 0x6, "251000", 0x458, 0x2c, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000, 0x0, 0x0, 0x300]}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, [], [{}, {0x0, 0x2, "937a1627327adac28e4efa5aa31467"}, {0x0, 0xd, "6c09213fa14ff629cabccb560dafabae5cf1168b0bf008a05acde2034386aa78c4f7c6816325b085dbe9a9b2aa9307397803493e8e12c8e23dff5df9aecbe3e9cb9fd29587bc3a6fd426e32d20f512f0e31662e5fb0ab8d383644a9ae5bdf22d26a5e8de46bbc7f2ed16"}, {0x0, 0x7a, "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"}]}}}}}}, 0x0) 21:05:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) 21:05:48 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 209.095620][ T9516] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value 21:05:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:05:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x200000000000007) r2 = socket$inet6(0xa, 0x3, 0x200000000000007) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) 21:05:49 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:49 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 21:05:49 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 209.504656][ T9547] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value [ 209.524669][ T9553] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.532198][ T9553] bridge0: port 1(bridge_slave_0) entered disabled state 21:05:49 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:49 executing program 2: 21:05:49 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:49 executing program 4: 21:05:49 executing program 2: 21:05:49 executing program 4: 21:05:49 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:49 executing program 2: 21:05:49 executing program 3: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_enter(r0, 0x5, 0x0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:05:49 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:49 executing program 4: 21:05:49 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:49 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:49 executing program 2: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 21:05:50 executing program 4: 21:05:50 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:50 executing program 2: 21:05:50 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:50 executing program 3: 21:05:50 executing program 4: 21:05:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 21:05:50 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:50 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:50 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) write$FUSE_DIRENTPLUS(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f3030000000000000000001b"], 0xc) recvfrom(r0, 0x0, 0x0, 0x60, 0x0, 0x0) 21:05:50 executing program 3: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x2, 0x0, 0x0, 0x4, 0x7, 0x5}, 0xd0}, 0xa) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000000}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 21:05:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:50 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) write$FUSE_DIRENTPLUS(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f3030000000000000000001b"], 0xc) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:05:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_enter(r0, 0x5, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 21:05:50 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:50 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) 21:05:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f00000001c0), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="85b0a7553993992bfaa2c542b7f219567bf8ee7e6784", 0x16, 0x2}, {&(0x7f0000000300)="86ac36ff746618a9b6e87e646a5d0852f0b2b18eb3cb93fff3be5bc39ec73b822ecaafe8", 0x24}, {&(0x7f0000000440)}], 0x0, &(0x7f00000005c0)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x55, 0x0, 0x0, 0x31], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x61, 0x25dc21e8924b7b29, 0x65], 0x2d, [0x0, 0x0, 0x62], 0x2d, [0x65, 0x63, 0x36, 0x0, 0x63, 0x0, 0x36, 0x9c96933ab6ecbc08]}}}, {@subj_role={'subj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}]}) 21:05:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_procfs(0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 21:05:50 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x820, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 21:05:50 executing program 3: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x2, 0x0, 0x0, 0x4, 0x7, 0x5}, 0xd0}, 0xa) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000000}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 21:05:50 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 211.152825][ T9668] ================================================================== [ 211.165258][ T9668] BUG: KASAN: null-ptr-deref in io_wq_cancel_all+0x28/0x2a0 [ 211.172543][ T9668] Write of size 8 at addr 0000000000000004 by task syz-executor.4/9668 [ 211.180772][ T9668] [ 211.183125][ T9668] CPU: 1 PID: 9668 Comm: syz-executor.4 Not tainted 5.4.0-rc4-next-20191025 #0 [ 211.192055][ T9668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.202117][ T9668] Call Trace: [ 211.205419][ T9668] dump_stack+0x172/0x1f0 [ 211.209761][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.214706][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.219656][ T9668] __kasan_report.cold+0x5/0x41 [ 211.224522][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.229469][ T9668] kasan_report+0x12/0x20 [ 211.233811][ T9668] check_memory_region+0x134/0x1a0 [ 211.238926][ T9668] __kasan_check_write+0x14/0x20 [ 211.243872][ T9668] io_wq_cancel_all+0x28/0x2a0 [ 211.248651][ T9668] io_ring_ctx_wait_and_kill+0x1e2/0x710 [ 211.254294][ T9668] io_uring_release+0x42/0x50 [ 211.258978][ T9668] __fput+0x2ff/0x890 [ 211.262969][ T9668] ? io_ring_ctx_wait_and_kill+0x710/0x710 [ 211.268785][ T9668] ____fput+0x16/0x20 [ 211.272766][ T9668] task_work_run+0x145/0x1c0 [ 211.277362][ T9668] do_exit+0x904/0x2e60 [ 211.281535][ T9668] ? mm_update_next_owner+0x640/0x640 [ 211.286938][ T9668] ? lock_downgrade+0x920/0x920 [ 211.291800][ T9668] ? _raw_spin_unlock_irq+0x23/0x80 [ 211.297001][ T9668] ? get_signal+0x392/0x24f0 [ 211.301597][ T9668] ? _raw_spin_unlock_irq+0x23/0x80 [ 211.306803][ T9668] do_group_exit+0x135/0x360 [ 211.306832][ T9668] get_signal+0x47c/0x24f0 [ 211.306852][ T9668] ? lock_downgrade+0x920/0x920 [ 211.306877][ T9668] do_signal+0x87/0x1700 [ 211.306891][ T9668] ? __kasan_check_read+0x11/0x20 [ 211.330066][ T9668] ? _copy_to_user+0x118/0x160 [ 211.334839][ T9668] ? setup_sigcontext+0x7d0/0x7d0 [ 211.339886][ T9668] ? exit_to_usermode_loop+0x43/0x380 [ 211.345262][ T9668] ? do_syscall_64+0x65f/0x760 [ 211.350027][ T9668] ? exit_to_usermode_loop+0x43/0x380 [ 211.350047][ T9668] ? lockdep_hardirqs_on+0x421/0x5e0 [ 211.350062][ T9668] ? trace_hardirqs_on+0x67/0x240 [ 211.350080][ T9668] exit_to_usermode_loop+0x286/0x380 [ 211.350100][ T9668] do_syscall_64+0x65f/0x760 [ 211.375592][ T9668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.381495][ T9668] RIP: 0033:0x459f39 21:05:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_procfs(0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 21:05:51 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 211.385395][ T9668] Code: 48 89 76 48 48 8d 44 24 08 48 89 46 38 48 89 6e 68 48 8b 1b 64 48 89 1c 25 f8 ff ff ff 48 8b 63 38 52 e8 aa bb fe ff 48 c7 04 <25> 03 10 00 00 00 00 00 00 5a c3 cc cc cc cc cc cc cc cc cc cc cc [ 211.402981][ T9679] FAT-fs (loop0): Unrecognized mount option "appraise" or missing value [ 211.404993][ T9668] RSP: 002b:00007f5fe97a0cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 211.405008][ T9668] RAX: 0000000000000000 RBX: 000000000075bfd0 RCX: 0000000000459f39 [ 211.405016][ T9668] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 211.405025][ T9668] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 211.405033][ T9668] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 211.405042][ T9668] R13: 00007ffe1e66322f R14: 00007f5fe97a19c0 R15: 000000000075bfd4 [ 211.405071][ T9668] ================================================================== [ 211.418808][ T3924] kobject: 'loop2' (000000003b0175b3): kobject_uevent_env [ 211.421765][ T9668] Disabling lock debugging due to kernel taint [ 211.465645][ T9668] Kernel panic - not syncing: panic_on_warn set ... [ 211.489796][ T9668] CPU: 1 PID: 9668 Comm: syz-executor.4 Tainted: G B 5.4.0-rc4-next-20191025 #0 [ 211.500135][ T9668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.510186][ T9668] Call Trace: [ 211.513477][ T9668] dump_stack+0x172/0x1f0 [ 211.517800][ T9668] panic+0x2e3/0x75c [ 211.521686][ T9668] ? add_taint.cold+0x16/0x16 [ 211.526361][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.531385][ T9668] ? preempt_schedule+0x4b/0x60 [ 211.536248][ T9668] ? ___preempt_schedule+0x16/0x18 [ 211.541354][ T9668] ? trace_hardirqs_on+0x5e/0x240 [ 211.546374][ T9668] ? io_wq_cancel_all+0x28/0x2a0 21:05:51 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000040)=0x334) [ 211.551313][ T9668] end_report+0x47/0x4f [ 211.555477][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.556753][ T3924] kobject: 'loop2' (000000003b0175b3): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 211.560418][ T9668] __kasan_report.cold+0xe/0x41 [ 211.575392][ T9668] ? io_wq_cancel_all+0x28/0x2a0 [ 211.580335][ T9668] kasan_report+0x12/0x20 [ 211.584667][ T9668] check_memory_region+0x134/0x1a0 [ 211.589778][ T9668] __kasan_check_write+0x14/0x20 [ 211.594719][ T9668] io_wq_cancel_all+0x28/0x2a0 [ 211.599476][ T9668] io_ring_ctx_wait_and_kill+0x1e2/0x710 [ 211.605085][ T9668] io_uring_release+0x42/0x50 [ 211.609905][ T9668] __fput+0x2ff/0x890 [ 211.613864][ T9668] ? io_ring_ctx_wait_and_kill+0x710/0x710 [ 211.619642][ T9668] ____fput+0x16/0x20 [ 211.623596][ T9668] task_work_run+0x145/0x1c0 [ 211.628157][ T9668] do_exit+0x904/0x2e60 [ 211.632330][ T9668] ? mm_update_next_owner+0x640/0x640 [ 211.637676][ T9668] ? lock_downgrade+0x920/0x920 [ 211.642503][ T9668] ? _raw_spin_unlock_irq+0x23/0x80 [ 211.647674][ T9668] ? get_signal+0x392/0x24f0 [ 211.652237][ T9668] ? _raw_spin_unlock_irq+0x23/0x80 [ 211.657407][ T9668] do_group_exit+0x135/0x360 [ 211.661974][ T9668] get_signal+0x47c/0x24f0 [ 211.666368][ T9668] ? lock_downgrade+0x920/0x920 [ 211.671198][ T9668] do_signal+0x87/0x1700 [ 211.675448][ T9668] ? __kasan_check_read+0x11/0x20 [ 211.680445][ T9668] ? _copy_to_user+0x118/0x160 [ 211.685183][ T9668] ? setup_sigcontext+0x7d0/0x7d0 [ 211.690191][ T9668] ? exit_to_usermode_loop+0x43/0x380 [ 211.695536][ T9668] ? do_syscall_64+0x65f/0x760 [ 211.700272][ T9668] ? exit_to_usermode_loop+0x43/0x380 [ 211.705619][ T9668] ? lockdep_hardirqs_on+0x421/0x5e0 [ 211.710875][ T9668] ? trace_hardirqs_on+0x67/0x240 [ 211.715886][ T9668] exit_to_usermode_loop+0x286/0x380 [ 211.721268][ T9668] do_syscall_64+0x65f/0x760 [ 211.725838][ T9668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.731734][ T9668] RIP: 0033:0x459f39 [ 211.735603][ T9668] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.755267][ T9668] RSP: 002b:00007f5fe97a0cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 211.763658][ T9668] RAX: 0000000000000000 RBX: 000000000075bfd0 RCX: 0000000000459f39 [ 211.771655][ T9668] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 211.779631][ T9668] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 211.787577][ T9668] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 211.795524][ T9668] R13: 00007ffe1e66322f R14: 00007f5fe97a19c0 R15: 000000000075bfd4 [ 211.804761][ T9668] Kernel Offset: disabled [ 211.809082][ T9668] Rebooting in 86400 seconds..