[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.049024][ T26] audit: type=1800 audit(1572900590.841:25): pid=8915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.069001][ T26] audit: type=1800 audit(1572900590.851:26): pid=8915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.104727][ T26] audit: type=1800 audit(1572900590.851:27): pid=8915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.187' (ECDSA) to the list of known hosts. 2019/11/04 20:50:02 fuzzer started 2019/11/04 20:50:04 dialing manager at 10.128.0.26:42879 2019/11/04 20:50:04 syscalls: 2566 2019/11/04 20:50:04 code coverage: enabled 2019/11/04 20:50:04 comparison tracing: enabled 2019/11/04 20:50:04 extra coverage: extra coverage is not supported by the kernel 2019/11/04 20:50:04 setuid sandbox: enabled 2019/11/04 20:50:04 namespace sandbox: enabled 2019/11/04 20:50:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 20:50:04 fault injection: enabled 2019/11/04 20:50:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 20:50:04 net packet injection: enabled 2019/11/04 20:50:04 net device setup: enabled 2019/11/04 20:50:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/04 20:50:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 20:52:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000380)='ms.os\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:52:05 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x1, 0x0, &(0x7f0000000200)=""/97, 0x0, 0xf000}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000000)=0xffffffffffffffff) syzkaller login: [ 195.131263][ T9085] IPVS: ftp: loaded support on port[0] = 21 [ 195.285586][ T9088] IPVS: ftp: loaded support on port[0] = 21 [ 195.298218][ T9085] chnl_net:caif_netlink_parms(): no params data found 20:52:06 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000100)='net/tcp\x00', 0x8, 0x0) [ 195.396228][ T9085] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.405919][ T9085] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.416128][ T9085] device bridge_slave_0 entered promiscuous mode [ 195.440129][ T9085] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.448520][ T9085] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.458496][ T9085] device bridge_slave_1 entered promiscuous mode [ 195.558632][ T9085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.616962][ T9085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.648365][ T9088] chnl_net:caif_netlink_parms(): no params data found 20:52:06 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) dup2(r2, 0xffffffffffffffff) [ 195.680293][ T9093] IPVS: ftp: loaded support on port[0] = 21 [ 195.697459][ T9085] team0: Port device team_slave_0 added [ 195.746395][ T9085] team0: Port device team_slave_1 added [ 195.807429][ T9088] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.815627][ T9088] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.824225][ T9088] device bridge_slave_0 entered promiscuous mode [ 195.861349][ T9088] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.872164][ T9088] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.881927][ T9088] device bridge_slave_1 entered promiscuous mode [ 195.929073][ T9085] device hsr_slave_0 entered promiscuous mode 20:52:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="e771b3e1ee8f49768a0825d031c13aeb"}], 0x1c) shutdown(r0, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) [ 196.006361][ T9085] device hsr_slave_1 entered promiscuous mode [ 196.132702][ T9095] IPVS: ftp: loaded support on port[0] = 21 [ 196.191939][ T9088] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.227516][ T9088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:52:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = getpid() r2 = getpid() r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000280)={r0}) [ 196.239225][ T9097] IPVS: ftp: loaded support on port[0] = 21 [ 196.369522][ T9088] team0: Port device team_slave_0 added [ 196.389688][ T9088] team0: Port device team_slave_1 added [ 196.402189][ T9093] chnl_net:caif_netlink_parms(): no params data found [ 196.431015][ T9101] IPVS: ftp: loaded support on port[0] = 21 [ 196.506219][ T9088] device hsr_slave_0 entered promiscuous mode [ 196.564518][ T9088] device hsr_slave_1 entered promiscuous mode [ 196.634018][ T9088] debugfs: Directory 'hsr0' with parent '/' already present! [ 196.726607][ T9093] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.733799][ T9093] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.741879][ T9093] device bridge_slave_0 entered promiscuous mode [ 196.751127][ T9093] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.758304][ T9093] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.766966][ T9093] device bridge_slave_1 entered promiscuous mode [ 196.831985][ T9095] chnl_net:caif_netlink_parms(): no params data found [ 196.889927][ T9093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.904873][ T9093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.961106][ T9093] team0: Port device team_slave_0 added [ 196.971209][ T9095] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.979313][ T9095] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.987353][ T9095] device bridge_slave_0 entered promiscuous mode [ 196.995936][ T9095] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.003034][ T9095] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.011635][ T9095] device bridge_slave_1 entered promiscuous mode [ 197.020174][ T9093] team0: Port device team_slave_1 added [ 197.086606][ T9095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.098697][ T9095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.186706][ T9101] chnl_net:caif_netlink_parms(): no params data found [ 197.197666][ T9097] chnl_net:caif_netlink_parms(): no params data found [ 197.209201][ T9095] team0: Port device team_slave_0 added [ 197.257147][ T9093] device hsr_slave_0 entered promiscuous mode [ 197.304363][ T9093] device hsr_slave_1 entered promiscuous mode [ 197.343869][ T9093] debugfs: Directory 'hsr0' with parent '/' already present! [ 197.380507][ T9095] team0: Port device team_slave_1 added [ 197.449743][ T9088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.470007][ T9101] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.478910][ T9101] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.487138][ T9101] device bridge_slave_0 entered promiscuous mode [ 197.502799][ T9097] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.510632][ T9097] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.519262][ T9097] device bridge_slave_0 entered promiscuous mode [ 197.528847][ T9097] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.536119][ T9097] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.548413][ T9097] device bridge_slave_1 entered promiscuous mode [ 197.564495][ T9101] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.571743][ T9101] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.581046][ T9101] device bridge_slave_1 entered promiscuous mode [ 197.647855][ T9095] device hsr_slave_0 entered promiscuous mode [ 197.704334][ T9095] device hsr_slave_1 entered promiscuous mode [ 197.764231][ T9095] debugfs: Directory 'hsr0' with parent '/' already present! [ 197.781039][ T9085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.806165][ T9088] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.819063][ T9097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.837046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.846221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.857761][ T9101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.886721][ T9097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.898728][ T9101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.914589][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.922882][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.936325][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.947258][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.956452][ T2949] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.963790][ T2949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.975396][ T9085] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.009877][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.018365][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.027450][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.038687][ T9100] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.046071][ T9100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.070244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.079215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.087703][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.095027][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.102774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.112653][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.122740][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.129937][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.141363][ T9101] team0: Port device team_slave_0 added [ 198.148937][ T9101] team0: Port device team_slave_1 added [ 198.165405][ T9097] team0: Port device team_slave_0 added [ 198.180563][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.190216][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.217700][ T9097] team0: Port device team_slave_1 added [ 198.232995][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.245495][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.254955][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.305925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.315071][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.323549][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.333047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.341952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.418171][ T9097] device hsr_slave_0 entered promiscuous mode [ 198.474605][ T9097] device hsr_slave_1 entered promiscuous mode [ 198.503890][ T9097] debugfs: Directory 'hsr0' with parent '/' already present! [ 198.566682][ T9101] device hsr_slave_0 entered promiscuous mode [ 198.604202][ T9101] device hsr_slave_1 entered promiscuous mode [ 198.643909][ T9101] debugfs: Directory 'hsr0' with parent '/' already present! [ 198.670739][ T9093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.680870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.690739][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.699938][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.766511][ T9088] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 198.777656][ T9088] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.791290][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.800150][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.810144][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.819034][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.828766][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.837447][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.867558][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.875683][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.884825][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.893163][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.901734][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.929077][ T9085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.940507][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.948512][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.956347][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.967184][ T9100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.982695][ T9093] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.996264][ T9088] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.017494][ T9095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.071668][ T9085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.098998][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.109516][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.119172][ T9106] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.126437][ T9106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.135569][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.144922][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.153257][ T9106] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.161383][ T9106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.169971][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.179905][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.188738][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.196507][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.204269][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.212032][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.220373][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.252751][ T9095] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.278959][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.294856][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.304183][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.352871][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.362048][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.375686][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.385581][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.394125][ T9091] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.401258][ T9091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.409310][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.418549][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.427557][ T9091] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.434922][ T9091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.442863][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.452434][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.471794][ T9093] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 199.483155][ T9093] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.501219][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.510472][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.538762][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.548684][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.558496][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.578443][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.610710][ T9097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.671016][ T9093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.680626][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.711764][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.731002][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.741922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.776798][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.785118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.796959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.813012][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 20:52:10 executing program 1: r0 = memfd_create(&(0x7f00000002c0)=']\x9dL\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 199.822140][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.842650][ T9101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.857300][ T9095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 20:52:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x10}, [@generic={0x7c}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x1f7, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0x9eb21109aa445960}, 0x48) [ 199.901189][ T9095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.961690][ T9097] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.980095][ T9141] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. [ 200.008053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.017373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.026944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.038658][ T9145] BPF:hdr_len not found [ 200.047230][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:52:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) close(r5) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r8, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r8, 0x8905, &(0x7f0000000680)) splice(r4, 0x0, r5, 0x0, 0x10000004ffe0, 0xb) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) [ 200.097547][ T9101] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.142936][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.155962][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.182462][ T9091] bridge0: port 1(bridge_slave_0) entered blocking state 20:52:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 200.189667][ T9091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.204345][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.221409][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.230237][ T9091] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.237467][ T9091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.246316][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.257125][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.265894][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.274646][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.285629][ T9091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.295916][ T9091] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.303088][ T9091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.350599][ T9095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.373131][ T9156] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value [ 200.443977][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.457015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:52:11 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8482) bind$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0xa7}, 0xa) setresuid(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="8aae5785390ae2aac24ea7c209f54ca472173f08", 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 200.502009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.556239][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.607435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.632808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 200.658066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.669122][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.673732][ C0] hrtimer: interrupt took 56656 ns [ 200.681526][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.698802][ T17] bridge0: port 2(bridge_slave_1) entered blocking state 20:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x200, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = open(&(0x7f0000074000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x20000513c3326}) sendto$rose(0xffffffffffffffff, &(0x7f0000000380)="33dfb02ad748a2a351fddf99e2788f5f2f3ef6076b7a0c7910f73c95e9ade9197c7fcbe09baf1b418a16d1e18f2cb379692c3d03ee9b2ec3b83e2a102b9bd48c938c08d7740294876dc4c93da2eba28f9f6ac9badbbc27571228a64799e6aa35639540d0c804b63c23a7db8df11c5a9dda336388599f3d7dc3321c413b374908f8442e1439f596df3f946361fa38c6f1a50cd0009f8546cf14d3b208ed69e050c2650f9c94d2c1a71d18423eb30aa3167945617225c5ca25cba48f4f07a02070f8aa5eba75fb06451fa0f384b1c34ca87d776112bd8d1fef52f57ab09aed93007bab465f367b41acb086fe4295c4069f", 0xf0, 0xf491f749d23ed622, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}]}) [ 200.706071][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.720413][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.732838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.784838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.795672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.815191][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.832097][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.850702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.868101][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.881685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.907353][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.916091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.925089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.934654][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.950005][ T9101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.961861][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.972894][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.991674][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:52:11 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) close(r5) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r8, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r8, 0x8905, &(0x7f0000000680)) splice(r4, 0x0, r5, 0x0, 0x10000004ffe0, 0xb) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) [ 201.004758][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.019118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.036655][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.046942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.069269][ T9097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.149950][ T9101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.182726][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:52:12 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8482) bind$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0xa7}, 0xa) setresuid(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="8aae5785390ae2aac24ea7c209f54ca472173f08", 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 201.199369][ T2949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.275028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.288789][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.341519][ T9188] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value [ 201.365145][ T9097] 8021q: adding VLAN 0 to HW filter on device batadv0 20:52:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x200, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = open(&(0x7f0000074000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x20000513c3326}) sendto$rose(0xffffffffffffffff, &(0x7f0000000380)="33dfb02ad748a2a351fddf99e2788f5f2f3ef6076b7a0c7910f73c95e9ade9197c7fcbe09baf1b418a16d1e18f2cb379692c3d03ee9b2ec3b83e2a102b9bd48c938c08d7740294876dc4c93da2eba28f9f6ac9badbbc27571228a64799e6aa35639540d0c804b63c23a7db8df11c5a9dda336388599f3d7dc3321c413b374908f8442e1439f596df3f946361fa38c6f1a50cd0009f8546cf14d3b208ed69e050c2650f9c94d2c1a71d18423eb30aa3167945617225c5ca25cba48f4f07a02070f8aa5eba75fb06451fa0f384b1c34ca87d776112bd8d1fef52f57ab09aed93007bab465f367b41acb086fe4295c4069f", 0xf0, 0xf491f749d23ed622, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}]}) [ 201.569472][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 201.569486][ T26] audit: type=1804 audit(1572900732.361:31): pid=9209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/0/bus" dev="sda1" ino=16539 res=1 [ 201.620737][ T26] audit: type=1804 audit(1572900732.411:32): pid=9204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/0/bus" dev="sda1" ino=16539 res=1 [ 201.728581][ T26] audit: type=1804 audit(1572900732.521:33): pid=9204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/0/bus" dev="sda1" ino=16539 res=1 20:52:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) dup2(r2, 0xffffffffffffffff) [ 201.853870][ T26] audit: type=1804 audit(1572900732.561:34): pid=9205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/0/bus" dev="sda1" ino=16539 res=1 [ 201.881508][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:52:12 executing program 4: lstat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000440), &(0x7f0000000480)=0x4) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2556607) r2 = creat(0x0, 0x0) ioctl$PPPIOCGDEBUG(r2, 0x80047441, 0x0) clone(0x1000060100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) keyctl$revoke(0x3, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000040)={'enc=', 'raw', ' hash=', {'sha384-ce\x00'}}, 0x0, &(0x7f0000000180)=""/151) 20:52:12 executing program 5: 20:52:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) dup2(r2, 0xffffffffffffffff) 20:52:12 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) close(r5) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r8, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r8, 0x8905, &(0x7f0000000680)) splice(r4, 0x0, r5, 0x0, 0x10000004ffe0, 0xb) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) [ 202.093961][ T26] audit: type=1804 audit(1572900732.561:35): pid=9205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/0/bus" dev="sda1" ino=16539 res=1 20:52:12 executing program 4: 20:52:13 executing program 0: mkdir(0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') creat(&(0x7f00000002c0)='./file0/file0\x00', 0x0) [ 202.273837][ T26] audit: type=1804 audit(1572900733.021:36): pid=9230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/1/bus" dev="sda1" ino=16537 res=1 20:52:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x2, 0x1, [@IFLA_VF_TRUST={0xc}]}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 20:52:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) sendmsg(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000740)="538d2c10ec689349c52bd289e6bac92338f170858b1e4d046d2b0b6d9c60af54588fe4147d9f739f30d2b0f88a", 0x2d}, {0x0}, {0x0}], 0x3, &(0x7f0000000b80)=[{0xbd0, 0x10d, 0x4, "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"}], 0xbd0}, 0x8000) [ 202.378670][ T26] audit: type=1804 audit(1572900733.021:37): pid=9230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir177422045/syzkaller.EU3mRT/1/bus" dev="sda1" ino=16537 res=1 20:52:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) r1 = dup(r0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) [ 202.425557][ T9252] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:13 executing program 2: [ 202.487051][ T9260] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.505159][ T9260] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.512801][ T9260] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.528962][ T26] audit: type=1804 audit(1572900733.101:38): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir335449892/syzkaller.N0Vffy/3/bus" dev="sda1" ino=16519 res=1 [ 202.607266][ T26] audit: type=1804 audit(1572900733.121:39): pid=9240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir335449892/syzkaller.N0Vffy/3/bus" dev="sda1" ino=16519 res=1 20:52:13 executing program 2: 20:52:13 executing program 5: 20:52:13 executing program 2: 20:52:13 executing program 5: 20:52:13 executing program 4: 20:52:13 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) close(r5) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r8, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r8, 0x8905, &(0x7f0000000680)) splice(r4, 0x0, r5, 0x0, 0x10000004ffe0, 0xb) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:13 executing program 2: 20:52:14 executing program 0: 20:52:14 executing program 5: 20:52:14 executing program 3: 20:52:14 executing program 4: 20:52:14 executing program 2: [ 203.337888][ T9296] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:14 executing program 4: 20:52:14 executing program 2: 20:52:14 executing program 5: 20:52:14 executing program 3: 20:52:14 executing program 0: 20:52:14 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) r4 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) close(r4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r7, 0x8905, &(0x7f0000000680)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:14 executing program 2: 20:52:14 executing program 4: 20:52:14 executing program 3: 20:52:14 executing program 0: 20:52:14 executing program 5: 20:52:14 executing program 0: 20:52:14 executing program 5: 20:52:14 executing program 3: 20:52:14 executing program 4: 20:52:14 executing program 2: 20:52:15 executing program 5: [ 204.276929][ T9338] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:15 executing program 3: 20:52:15 executing program 4: 20:52:15 executing program 2: 20:52:15 executing program 5: 20:52:15 executing program 0: 20:52:15 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) r4 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) close(r4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x1) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:15 executing program 0: 20:52:15 executing program 3: 20:52:15 executing program 2: 20:52:15 executing program 4: 20:52:15 executing program 5: 20:52:16 executing program 3: [ 205.165698][ T9369] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) r4 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) close(r4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:16 executing program 5: 20:52:16 executing program 0: 20:52:16 executing program 4: 20:52:16 executing program 2: 20:52:16 executing program 3: 20:52:16 executing program 2: 20:52:16 executing program 3: 20:52:16 executing program 0: 20:52:16 executing program 4: 20:52:16 executing program 5: lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 20:52:16 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000001c0)) [ 206.121860][ T9399] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value [ 206.152492][ T9404] binder: 9403:9404 ioctl c018620c 200001c0 returned -1 20:52:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) r4 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) close(r4) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0b08060001080006040003ffffffffffffe0aaaaaaaaaaaa7f000001000000"], &(0x7f0000000180)={0x0, 0x0, [0x225]}) 20:52:17 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x1c, 0x0, &(0x7f0000000000)=[@free_buffer, @acquire, @increfs={0x40046304, 0x3}], 0x0, 0x0, 0x0}) 20:52:17 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000001c0)) 20:52:17 executing program 3: 20:52:17 executing program 5: 20:52:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(0xffffffffffffffff, 0x0) 20:52:17 executing program 5: inotify_init1(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r2, r3, 0x0, 0x80000002) [ 206.800199][ T9418] binder: 9412:9418 ioctl c018620c 200001c0 returned -1 [ 206.810782][ T9419] debugfs: File '9416' in directory 'proc' already present! 20:52:17 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x33, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="116348400000000000000000000000000000000000000000000000000000000000000000cbfeffffffffffff180000000000cb"], 0x0, 0x0, 0x0}) 20:52:17 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x48, 0x0, &(0x7f0000000300)=[@register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 20:52:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x2, 0x2004a001) [ 206.967532][ T9431] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:17 executing program 4: prctl$PR_SET_MM(0x23, 0xc, &(0x7f0000ffa000/0x4000)=nil) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) utimensat(r1, &(0x7f0000000300)='./bus\x00', &(0x7f0000000380)={{0x77359400}}, 0x100) [ 207.029134][ T9437] debugfs: File '9436' in directory 'proc' already present! [ 207.103616][ T9437] debugfs: File '9436' in directory 'proc' already present! [ 207.189154][ T9449] binder: BINDER_SET_CONTEXT_MGR already set [ 207.234559][ T9449] binder: 9436:9449 ioctl 40046207 0 returned -16 20:52:18 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r4, 0x400454ce, r5) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:18 executing program 2: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x4cd, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 20:52:18 executing program 3: r0 = epoll_create1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:18 executing program 0: r0 = epoll_create1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x0, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x2, 0x2004a001) 20:52:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x0, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x2, 0x2004a001) [ 207.705224][ T9462] debugfs: File '9460' in directory 'proc' already present! [ 207.781188][ T9462] binder: 9460:9462 unknown command 0 [ 207.812218][ T9462] binder: 9460:9462 ioctl c0306201 20000180 returned -22 [ 207.860911][ T9477] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 20:52:18 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = dup(r3) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, r4, 0x0) 20:52:18 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 20:52:19 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001380)={0x4c, 0x0, &(0x7f0000000200)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f00000001c0)}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f00000000c0)}, 0x1000}], 0x0, 0x0, 0x0}) 20:52:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 20:52:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, 0x0, 0x0) 20:52:19 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) [ 208.394385][ T9509] debugfs: File '9505' in directory 'proc' already present! [ 208.435658][ T9509] debugfs: File '9505' in directory 'proc' already present! 20:52:19 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:19 executing program 2: r0 = epoll_create1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x0, 0x0) bind(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x1, 0x2004a001) 20:52:19 executing program 5: lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 20:52:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0xf) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x5a) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x6, 0x0, "0197018753b5c7097efb601a3a8e53c5"}, 0x15, 0x1) ioctl(r0, 0x8936, &(0x7f0000000000)) 20:52:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0xf) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x5a) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x17, 0x6, 0x1, "0197018753b5c7097efb601a3a8e53c5", "69e0"}, 0x17, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl(r0, 0x8936, &(0x7f0000000000)) 20:52:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udplite\x00') setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x4, 0x1, 0x0, 0x1, 0xf9fb}, 0xc) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00022, r2}) 20:52:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f00000000c0)) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00022, r1}) 20:52:19 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 20:52:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0xf) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@remote}, 0x5a) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 208.885188][ T9537] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:19 executing program 2: r0 = epoll_create1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x0, 0x0) bind(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x1, 0x2004a001) 20:52:19 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)}, 0x0) futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 20:52:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x29000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) 20:52:20 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)}, 0x0) futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 20:52:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x1d5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 20:52:20 executing program 0: socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)) [ 209.764440][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 209.770749][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:52:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)}, 0x0) futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 20:52:20 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 20:52:20 executing program 2: r0 = epoll_create1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x0, 0x0) bind(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002cc0)}], 0x1}}], 0x1, 0x2004a001) [ 209.888269][ T9590] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:20 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'nr0\x00'}) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 20:52:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xf, 0x6, [@remote, @rand_addr, @empty]}]}}}], 0x20, 0x5}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:52:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)}, 0x0) futex(0x0, 0x9, 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 20:52:21 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 20:52:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 20:52:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:21 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x0) 20:52:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xf, 0x6, [@remote, @rand_addr, @empty]}]}}}], 0x20, 0x5}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:52:21 executing program 0: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f0000000500)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) 20:52:21 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 20:52:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xf, 0x6, [@remote, @rand_addr, @empty]}]}}}], 0x20, 0x5}, 0x0) [ 210.696320][ T26] audit: type=1804 audit(1572900741.491:40): pid=9634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir743868810/syzkaller.lDGmjd/22/bus" dev="sda1" ino=16566 res=1 20:52:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7d}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(r0) 20:52:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000500), &(0x7f0000000480)}, 0x20) [ 210.771167][ T26] audit: type=1804 audit(1572900741.521:41): pid=9634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir743868810/syzkaller.lDGmjd/22/bus" dev="sda1" ino=16566 res=1 [ 210.808926][ T9645] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:21 executing program 0: r0 = socket$inet(0x2, 0x80803, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000001c0)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x1, 0x0) 20:52:21 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 20:52:21 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x14, 0x4, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x14, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x1}]}}}}}}, 0x0) 20:52:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x50, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_AF_SPEC={0x28, 0x1a, [{0x4, 0x2}, {0xfffffffffffffe2c}, {0x4}, {0x4}, {0x4, 0x4000}, {0x4}, {0x4}, {0x4}, {0xfffffffffffffdc2}]}, @IFLA_GROUP={0x8}]}, 0x50}}, 0x0) 20:52:22 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0xffffffff) 20:52:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc1105511, &(0x7f0000000380)) 20:52:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:52:22 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) 20:52:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000900)="9e83e6ac11073df9e1a38e98a831f46b8ea059cdc7b3d5cb3abcc858c4ebe76034a5bf9fe585d3bb8d1cd728d6dd91f25993b969e6da6a3454391441c41af27524785a28f002bf736a7e8e0dd6e3396bbb62f389f56c76a25864ea782ff2485f89f3ca0e1b08196c213e586f3b8216fd54842445d8f2f5f51414691eabb1917e44de95596bbd2336605c74998308ed81a2f78d8536e866b3558b94f347aaae8d623acf08dbfe14c5b939423f1cf5dde154dd31aefe8a783a2e", 0xb9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)=' ', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 211.810726][ T9695] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:22 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 20:52:23 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) fcntl$setstatus(r0, 0x4, 0x44800) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x8) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x600}]) 20:52:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x233, 0x200007f9, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 20:52:23 executing program 2: ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) rt_sigqueueinfo(0x0, 0x3a, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) accept(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) 20:52:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000380)=0x10) [ 214.507614][ T9675] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.515679][ T9675] bridge0: port 1(bridge_slave_0) entered disabled state 20:52:28 executing program 4: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 20:52:28 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:28 executing program 3: ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) rt_sigqueueinfo(0x0, 0x3a, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) accept(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) 20:52:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 20:52:28 executing program 2: ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) rt_sigqueueinfo(0x0, 0x3a, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) accept(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) 20:52:28 executing program 0: ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) rt_sigqueueinfo(0x0, 0x3a, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) accept(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) [ 218.260755][ T9753] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value 20:52:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 20:52:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 20:52:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {0x0, 0xfffffffffffffc9c, 0x0, 0x2, 0x2}}, 0x68) 20:52:29 executing program 2: ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) rt_sigqueueinfo(0x0, 0x3a, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) accept(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x80) 20:52:29 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4008af20, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) 20:52:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140), 0x4) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 20:52:29 executing program 4: 20:52:29 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302", 0x11}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket(0x10, 0x803, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a61c) pipe(&(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="968f54afaf75077f90716c654897aac774a8d1c7f99424f092bb120bfe527fe0ba6ffbff24e77483965f9f01340225b38900c9724135da6e0752468c8616aa79c963b684565d3a2f3fb692974779acfb0456124cbc984acb1c92b6bffa5a61aeef6490f737f78fff7c16948e538478d473583a48d2626e9d7be88dd8d4d9b44d152b980bd6e92d840aa8ec9652cb58c522e7366dce17990c4e3a9b1720c70266d6414d5b861e0344ff287c319f193c1b9910a78f390aa9ee29d13374934886b51e", 0xc1, 0x4}], 0x400, &(0x7f0000000480)={[{@shortname_winnt='shortname=winnt'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x2}}, {@utf8no='utf8=0'}, {@fat=@nocase='nocase'}], [{@uid_lt={'uid<'}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'mime_type)+eth1^.'}}]}) 20:52:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {0x0, 0xfffffffffffffc9c, 0x0, 0x2, 0x2}}, 0x68) [ 219.124670][ T1076] INFO: task khugepaged:1083 blocked for more than 143 seconds. [ 219.132526][ T1076] Not tainted 5.4.0-rc5-next-20191031 #0 [ 219.173570][ T1076] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 219.191386][ T3997] kobject: 'loop0' (000000007fa92ac2): kobject_uevent_env 20:52:30 executing program 4: [ 219.219372][ T1076] khugepaged D27840 1083 2 0x80004000 [ 219.220570][ T3997] kobject: 'loop0' (000000007fa92ac2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 219.247466][ T1076] Call Trace: [ 219.250998][ T1076] __schedule+0x94a/0x1e70 [ 219.259800][ T1076] ? __sched_text_start+0x8/0x8 [ 219.291780][ T1076] ? blk_insert_cloned_request+0x530/0x530 [ 219.299075][ T3997] kobject: 'loop4' (000000004936c5e3): kobject_uevent_env [ 219.311016][ T9794] kobject: 'loop1' (000000003f05ca7b): kobject_uevent_env [ 219.319705][ T9794] kobject: 'loop1' (000000003f05ca7b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 219.332407][ T3997] kobject: 'loop4' (000000004936c5e3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 219.343872][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 [ 219.350813][ T1076] ? __lock_page+0x3d9/0xab0 [ 219.367146][ T9794] FAT-fs (loop1): Unrecognized mount option "uid<00000000000000000000" or missing value [ 219.380846][ T1076] ? _raw_spin_unlock_irq+0x23/0x80 20:52:30 executing program 4: 20:52:30 executing program 2: [ 219.422679][ T1076] schedule+0xdc/0x2b0 [ 219.438523][ T1076] io_schedule+0x1c/0x70 [ 219.451959][ T1076] __lock_page+0x422/0xab0 [ 219.458732][ T1076] ? wait_on_page_bit+0xa60/0xa60 [ 219.465157][ T1076] ? page_cache_next_miss+0x340/0x340 [ 219.470785][ T1076] ? ___might_sleep+0x163/0x2c0 [ 219.475979][ T1076] ? __might_sleep+0x95/0x190 [ 219.480740][ T1076] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 219.486831][ T1076] ? mpage_process_page_bufs+0x780/0x780 [ 219.492554][ T1076] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 219.498218][ T1076] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 219.504355][ T1076] ? __kmalloc_node+0xf/0x70 [ 219.509348][ T1076] ext4_writepages+0x954/0x2e70 [ 219.514297][ T1076] ? scheduler_ipi+0x10c/0x610 [ 219.519087][ T1076] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 219.524733][ T1076] ? 0xffffffff81000000 [ 219.528910][ T1076] ? mark_lock+0xc2/0x1220 [ 219.533340][ T1076] ? prep_new_page+0x19f/0x200 [ 219.538199][ T1076] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 219.544264][ T1076] ? find_held_lock+0x35/0x130 [ 219.549047][ T1076] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 219.555137][ T1076] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 219.560760][ T1076] do_writepages+0xfa/0x2a0 [ 219.565380][ T1076] ? do_writepages+0xfa/0x2a0 [ 219.570099][ T1076] ? lock_downgrade+0x920/0x920 [ 219.575255][ T1076] ? page_writeback_cpu_online+0x20/0x20 [ 219.581002][ T1076] ? __kasan_check_read+0x11/0x20 [ 219.587029][ T1076] ? do_raw_spin_unlock+0x57/0x270 [ 219.592212][ T1076] ? _raw_spin_unlock+0x28/0x40 [ 219.597163][ T1076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.604843][ T1076] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 219.610862][ T1076] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 219.616680][ T1076] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 219.622772][ T1076] ? lockdep_hardirqs_on+0x421/0x5e0 [ 219.628154][ T1076] filemap_flush+0x24/0x30 [ 219.632604][ T1076] collapse_file+0x36b1/0x41a0 [ 219.637540][ T1076] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 219.643808][ T1076] ? khugepaged+0x21c0/0x4360 [ 219.648581][ T1076] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 219.656827][ T1076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 219.662830][ T1076] ? khugepaged_find_target_node+0x142/0x180 [ 219.668891][ T1076] khugepaged+0x2da9/0x4360 [ 219.673419][ T1076] ? __kasan_check_read+0x11/0x20 [ 219.678519][ T1076] ? __lock_acquire+0x16f2/0x4a00 [ 219.683821][ T1076] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 219.689557][ T1076] ? lock_downgrade+0x920/0x920 [ 219.694472][ T1076] ? finish_wait+0x260/0x260 [ 219.699077][ T1076] ? lockdep_hardirqs_on+0x421/0x5e0 [ 219.704851][ T1076] ? trace_hardirqs_on+0x67/0x240 [ 219.709915][ T1076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 219.717077][ T1076] ? __kthread_parkme+0x108/0x1c0 [ 219.722245][ T1076] ? __kasan_check_read+0x11/0x20 [ 219.727338][ T1076] kthread+0x361/0x430 [ 219.731448][ T1076] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 219.737149][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 219.743031][ T1076] ret_from_fork+0x24/0x30 [ 219.747804][ T1076] [ 219.747804][ T1076] Showing all locks held in the system: [ 219.755773][ T1076] 4 locks held by kworker/u4:3/225: [ 219.760972][ T1076] #0: ffff8880a762a128 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 20:52:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) socket$packet(0x11, 0x8000000003, 0x300) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) [ 219.771788][ T1076] #1: ffff8880a921fdc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 219.783584][ T1076] #2: ffff8882158b80d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 219.793320][ T1076] #3: ffff8882158ba990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 219.803194][ T1076] 1 lock held by khungtaskd/1076: [ 219.808295][ T1076] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 219.817679][ T1076] 1 lock held by khugepaged/1083: [ 219.822709][ T1076] #0: ffff8882158ba990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 219.832714][ T1076] 1 lock held by rsyslogd/8953: [ 219.837614][ T1076] #0: ffff88809cf868e0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 219.847370][ T1076] 2 locks held by getty/9043: [ 219.852081][ T1076] #0: ffff88809cf69090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.861495][ T1076] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.872089][ T1076] 2 locks held by getty/9044: [ 219.876852][ T1076] #0: ffff8880a7283090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.886041][ T1076] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.896665][ T1076] 2 locks held by getty/9045: [ 219.901415][ T1076] #0: ffff8880985e3090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.910570][ T1076] #1: ffffc90005f3d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.920465][ T1076] 2 locks held by getty/9046: [ 219.925218][ T1076] #0: ffff8880a3949090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.934788][ T1076] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.944423][ T1076] 2 locks held by getty/9047: [ 219.949114][ T1076] #0: ffff8880a917b090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.958334][ T1076] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.968120][ T1076] 2 locks held by getty/9048: [ 219.972963][ T1076] #0: ffff888098cd0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 219.983000][ T1076] #1: ffffc90005f412e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 219.993801][ T1076] 2 locks held by getty/9049: [ 219.998526][ T1076] #0: ffff888098a12090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 220.007701][ T1076] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 220.017805][ T1076] 2 locks held by syz-executor.2/9093: [ 220.023601][ T1076] #0: ffff888090ddf3f8 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1600 [ 220.032975][ T1076] #1: ffffffff89520dc0 (loop_ctl_mutex){+.+.}, at: lo_open+0x1d/0xd0 [ 220.041470][ T1076] 2 locks held by syz-executor.4/9097: [ 220.047025][ T1076] #0: ffff888090d90278 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1600 [ 220.057189][ T1076] #1: ffffffff89520dc0 (loop_ctl_mutex){+.+.}, at: lo_open+0x1d/0xd0 [ 220.065598][ T1076] 2 locks held by syz-executor.5/9101: [ 220.071443][ T1076] #0: ffff888090d8f238 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1600 [ 220.080679][ T1076] #1: ffffffff89520dc0 (loop_ctl_mutex){+.+.}, at: lo_open+0x1d/0xd0 [ 220.089023][ T1076] 1 lock held by syz-executor.1/9794: [ 220.094486][ T1076] #0: ffffffff89520dc0 (loop_ctl_mutex){+.+.}, at: __loop_clr_fd+0x88/0xd60 [ 220.103536][ T1076] 1 lock held by blkid/9797: [ 220.108369][ T1076] #0: ffff888090d90278 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1600 [ 220.117375][ T1076] 2 locks held by blkid/9798: [ 220.122298][ T1076] #0: ffff888090e00338 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1600 [ 220.132373][ T1076] #1: ffffffff89520dc0 (loop_ctl_mutex){+.+.}, at: lo_open+0x1d/0xd0 [ 220.141332][ T1076] [ 220.143804][ T1076] ============================================= [ 220.143804][ T1076] [ 220.152354][ T1076] NMI backtrace for cpu 0 [ 220.154030][ T9794] kobject: 'loop1' (000000003f05ca7b): kobject_uevent_env [ 220.157062][ T1076] CPU: 0 PID: 1076 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 20:52:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {0x0, 0xfffffffffffffc9c, 0x0, 0x2, 0x2}}, 0x68) [ 220.172203][ T9794] kobject: 'loop1' (000000003f05ca7b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 220.173205][ T1076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.173211][ T1076] Call Trace: [ 220.173234][ T1076] dump_stack+0x172/0x1f0 [ 220.173254][ T1076] nmi_cpu_backtrace.cold+0x70/0xb2 [ 220.206573][ T1076] ? vprintk_func+0x86/0x189 [ 220.211289][ T1076] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 220.216955][ T1076] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 220.223319][ T1076] arch_trigger_cpumask_backtrace+0x14/0x20 [ 220.229299][ T1076] watchdog+0xc8f/0x1350 [ 220.233847][ T1076] kthread+0x361/0x430 [ 220.238213][ T1076] ? reset_hung_task_detector+0x30/0x30 [ 220.243873][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 220.249657][ T1076] ret_from_fork+0x24/0x30 [ 220.254505][ T1076] Sending NMI from CPU 0 to CPUs 1: [ 220.260393][ C1] NMI backtrace for cpu 1 [ 220.260399][ C1] CPU: 1 PID: 9799 Comm: syz-executor.4 Not tainted 5.4.0-rc5-next-20191031 #0 [ 220.260405][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.260410][ C1] RIP: 0010:unmap_page_range+0x894/0x2660 [ 220.260421][ C1] Code: 80 00 00 00 00 c7 85 d0 fe ff ff 00 00 00 00 e8 e2 f3 d3 ff 4c 89 e8 48 c1 e8 03 42 80 3c 38 00 0f 85 ed 18 00 00 4d 8b 65 00 <31> ff 4c 89 e3 48 83 e3 9f 48 89 de e8 5b f5 d3 ff 48 85 db 0f 84 [ 220.260425][ C1] RSP: 0018:ffff8880627ff980 EFLAGS: 00000246 [ 220.260433][ C1] RAX: 1ffff110142917f8 RBX: 00007f7563bf8000 RCX: ffffffff819f787c [ 220.260438][ C1] RDX: 0000000000000000 RSI: ffffffff819f71ae RDI: 0000000000000006 [ 220.260443][ C1] RBP: ffff8880627ffae8 R08: ffff888098ddc540 R09: fffff94000345c9f [ 220.260448][ C1] R10: fffff94000345c9e R11: ffffea0001a2e4f3 R12: 8000000068b94007 [ 220.260453][ C1] R13: ffff8880a148bfc0 R14: 00007f7563c00000 R15: dffffc0000000000 [ 220.260458][ C1] FS: 00000000023b4940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 220.260462][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 220.260468][ C1] CR2: 0000000000960000 CR3: 000000006816d000 CR4: 00000000001406e0 [ 220.260473][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 220.260477][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 220.260480][ C1] Call Trace: [ 220.260484][ C1] ? __kasan_check_read+0x11/0x20 [ 220.260487][ C1] ? vm_normal_page_pmd+0x5b0/0x5b0 [ 220.260492][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.260495][ C1] ? uprobe_munmap+0xad/0x320 [ 220.260499][ C1] unmap_single_vma+0x19d/0x300 [ 220.260502][ C1] unmap_vmas+0x184/0x2f0 [ 220.260505][ C1] ? zap_vma_ptes+0x110/0x110 [ 220.260509][ C1] ? __mutex_lock+0x458/0x13c0 [ 220.260512][ C1] ? __kasan_check_write+0x14/0x20 [ 220.260515][ C1] exit_mmap+0x2ba/0x530 [ 220.260519][ C1] ? __ia32_sys_munmap+0x80/0x80 [ 220.260522][ C1] ? mutex_unlock+0x1b/0x30 [ 220.260525][ C1] mmput+0x179/0x4d0 [ 220.260528][ C1] do_exit+0x823/0x2e60 [ 220.260532][ C1] ? __close_fd+0x1e0/0x210 [ 220.260536][ C1] ? mm_update_next_owner+0x640/0x640 [ 220.260540][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 220.260543][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.260547][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.260551][ C1] do_group_exit+0x135/0x360 [ 220.260554][ C1] __x64_sys_exit_group+0x44/0x50 [ 220.260558][ C1] do_syscall_64+0xfa/0x760 [ 220.260562][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.260565][ C1] RIP: 0033:0x45a219 [ 220.260575][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.260579][ C1] RSP: 002b:00007ffd568ded88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 220.260588][ C1] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045a219 [ 220.260593][ C1] RDX: 0000000000413d90 RSI: 00000000000000da RDI: 0000000000000000 [ 220.260598][ C1] RBP: 0000000000000000 R08: 0000000000000004 R09: 00007ffd568dede0 [ 220.260603][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.260608][ C1] R13: 00007ffd568dede0 R14: 0000000000000000 R15: 00007ffd568dedf0 [ 220.314209][ T1076] Kernel panic - not syncing: hung_task: blocked tasks [ 220.318556][ T3997] kobject: 'loop2' (00000000fa62dabe): kobject_uevent_env [ 220.324572][ T1076] CPU: 0 PID: 1076 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 220.324581][ T1076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.324586][ T1076] Call Trace: [ 220.324609][ T1076] dump_stack+0x172/0x1f0 [ 220.324632][ T1076] panic+0x2e3/0x75c [ 220.324650][ T1076] ? add_taint.cold+0x16/0x16 [ 220.333240][ T3997] kobject: 'loop2' (00000000fa62dabe): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 220.341481][ T1076] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 220.341501][ T1076] ? ___preempt_schedule+0x16/0x18 [ 220.341516][ T1076] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 220.341527][ T1076] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 220.341537][ T1076] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 220.341548][ T1076] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 220.341563][ T1076] watchdog+0xca0/0x1350 [ 220.341591][ T1076] kthread+0x361/0x430 [ 220.370748][ T3997] kobject: 'loop5' (00000000e311b926): kobject_uevent_env [ 220.373900][ T1076] ? reset_hung_task_detector+0x30/0x30 [ 220.373915][ T1076] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 220.373929][ T1076] ret_from_fork+0x24/0x30 [ 220.384022][ T1076] Kernel Offset: disabled [ 220.734216][ T1076] Rebooting in 86400 seconds..