cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 183.585401] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 183.585401] 33 veth0_to_team 1 0 333300000001 [ 183.585401] 33 veth0_to_team 1 0 01005e000001 [ 183.585401] 33 veth0_to_team 1 0 3333ff00001f [ 183.585401] 33 veth0_to_team 1 0 3333ffaaaa1f [ 183.585401] 27 veth1_to_bridge 1 0 333300000001 [ 183.585401] 27 veth1_to_bridge 1 0 01005e000001 [ 183.593284] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 14:10:04 executing program 2: 14:10:04 executing program 5: 14:10:04 executing program 0: 14:10:04 executing program 2: 14:10:04 executing program 4: 14:10:04 executing program 5: 14:10:04 executing program 0: 14:10:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:04 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:04 executing program 5: 14:10:04 executing program 4: 14:10:04 executing program 0: 14:10:04 executing program 2: [ 183.984634] tmpfs: No value for mount option ' 3333ff00001a [ 183.984634] 36 team_slave_1 1 0 3333ffaaaa1a [ 183.984634] 36 team_slave_1 1 0 3333ffaff80e [ 183.984634] 25 veth0_to_bridge 1 0 333300000001 [ 183.984634] 25 veth0_to_bridge 1 0 3333ff00001b [ 183.984634] 25 veth0_to_bridge 1 0 01005e000001 [ 183.984634] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 183.984634] 26 bridge_slave_0 1 0 333300000001 [ 183.984634] 26 bridge_slave_0 1 0 01005e000001 14:10:04 executing program 4: 14:10:04 executing program 5: [ 183.984634] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 183.984634] 33 veth0_to_team 1 0 333300000001 [ 183.984634] 33 veth0_to_team 1 0 01005e000001 [ 183.984634] 33 veth0_to_team 1 0 3333ff00001f [ 183.984634] 33 veth0_to_team 1 0 3333ffaaaa1f [ 183.984634] 27 veth1_to_bridge 1 0 333300000001 [ 183.984634] 27 veth1_to_bridge 1 0 01005e000001 14:10:04 executing program 0: 14:10:04 executing program 4: 14:10:04 executing program 2: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00)=[{0x0}], 0x1}}], 0x3fffffffffffccb, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:10:04 executing program 5: 14:10:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:04 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:04 executing program 4: 14:10:04 executing program 5: 14:10:04 executing program 0: 14:10:04 executing program 4: 14:10:04 executing program 0: 14:10:04 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e6700000000000000000000000000000000000000000000000000000018040000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000027327243426c7d2d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c770000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff00000000"]}, 0xa38) [ 184.386289] tmpfs: No value for mount option ' 3333ff00001a [ 184.386289] 36 team_slave_1 1 0 3333ffaaaa1a [ 184.386289] 36 team_slave_1 1 0 3333ffaff80e [ 184.386289] 25 veth0_to_bridge 1 0 333300000001 [ 184.386289] 25 veth0_to_bridge 1 0 3333ff00001b [ 184.386289] 25 veth0_to_bridge 1 0 01005e000001 [ 184.386289] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 184.386289] 26 bridge_slave_0 1 0 333300000001 [ 184.386289] 26 bridge_slave_0 1 0 01005e000001 14:10:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 184.386289] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 184.386289] 33 veth0_to_team 1 0 333300000001 [ 184.386289] 33 veth0_to_team 1 0 01005e000001 [ 184.386289] 33 veth0_to_team 1 0 3333ff00001f [ 184.386289] 33 veth0_to_team 1 0 3333ffaaaa1f [ 184.386289] 27 veth1_to_bridge 1 0 333300000001 [ 184.386289] 27 veth1_to_bridge 1 0 01005e000001 [ 184.431732] ebt_among: dst integrity fail: 3cd 14:10:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0xffffffbf}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x3c) 14:10:05 executing program 2: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00)=[{0x0}], 0x1}}], 0x3fffffffffffccb, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:10:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x3c) 14:10:05 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, 0x0, &(0x7f0000000080)) readv(r0, &(0x7f0000395000)=[{0x0}], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = syz_open_dev$swradio(0x0, 0x1, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) syz_open_dev$vcsn(0x0, 0x0, 0x800) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000000)) 14:10:05 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x5, 0x3, 0x8, 0x0, 0x4, 0x1}, 0x20) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x81) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x9aa, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000300)=0x1, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @empty}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) r5 = accept(r1, 0x0, 0x0) dup2(r0, r5) 14:10:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x5, 0x3, 0x8, 0x0, 0x4, 0x1}, 0x20) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x81) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x9aa, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000300)=0x1, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @empty}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) r5 = accept(r1, 0x0, 0x0) dup2(r0, r5) [ 184.859310] tmpfs: No value for mount option ' 3333ff00001a [ 184.859310] 36 team_slave_1 1 0 3333ffaaaa1a [ 184.859310] 36 team_slave_1 1 0 3333ffaff80e [ 184.859310] 25 veth0_to_bridge 1 0 333300000001 [ 184.859310] 25 veth0_to_bridge 1 0 3333ff00001b [ 184.859310] 25 veth0_to_bridge 1 0 01005e000001 [ 184.859310] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 184.859310] 26 bridge_slave_0 1 0 333300000001 [ 184.859310] 26 bridge_slave_0 1 0 01005e000001 14:10:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 184.859310] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 184.859310] 33 veth0_to_team 1 0 333300000001 [ 184.859310] 33 veth0_to_team 1 0 01005e000001 [ 184.859310] 33 veth0_to_team 1 0 3333ff00001f [ 184.859310] 33 veth0_to_team 1 0 3333ffaaaa1f [ 184.859310] 27 veth1_to_bridge 1 0 333300000001 [ 184.859310] 27 veth1_to_bridge 1 0 01005e000001 14:10:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:05 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:05 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, 0x0, &(0x7f0000000080)) readv(r0, &(0x7f0000395000)=[{0x0}], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = syz_open_dev$swradio(0x0, 0x1, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) syz_open_dev$vcsn(0x0, 0x0, 0x800) sendfile(r1, r4, 0x0, 0x80001d00c0d0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000000)) 14:10:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f00000006c0)) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x105000) epoll_wait(r1, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0xffff) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000001c0)={0xffffffffffffff00, 0x4}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000080), 0x4) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) ftruncate(r0, 0xb5) 14:10:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:05 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000140)={0x3f, 0xfffffffffffffff7, 0x2, 'queue1\x00', 0x547}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900800000000a000000000000000000000000000000000000000000f1ffffff0000000000000200010000000000000000fd0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xc0000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:10:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x5, 0x3, 0x8, 0x0, 0x4, 0x1}, 0x20) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x81) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x9aa, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000300)=0x1, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @empty}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) r5 = accept(r1, 0x0, 0x0) dup2(r0, r5) 14:10:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:06 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x5, 0x3, 0x8, 0x0, 0x4, 0x1}, 0x20) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x81) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x9aa, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000300)=0x1, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @empty}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) r5 = accept(r1, 0x0, 0x0) dup2(r0, r5) 14:10:06 executing program 5: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000040)=@full={0xb, @dev, @remote, 0x0, [@bcast, @bcast, @netrom, @rose, @remote, @default]}, &(0x7f00000000c0)=0x40, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x0, 0x0) chmod(0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0x2000000000007, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) r5 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r3, r5, 0x0, 0x88000fc000000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mknodat(r1, &(0x7f00000001c0)='./file0\x00', 0x1, 0x1) fsetxattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73ca63917269dd81544534435b7e6473463fc3"], &(0x7f0000000140)='/dev/dsp#\x00', 0xa, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x10, 0x3, 0x81) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x410002) ioctl$int_out(r7, 0x5462, &(0x7f0000000240)) sendmsg(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f000000d000)}, 0x0) 14:10:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000140)={0x3f, 0xfffffffffffffff7, 0x2, 'queue1\x00', 0x547}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900800000000a000000000000000000000000000000000000000000f1ffffff0000000000000200010000000000000000fd0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xc0000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:10:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:06 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:06 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:06 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) 14:10:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@local, 0x5, 0x3, 0x8, 0x0, 0x4, 0x1}, 0x20) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x81) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x9aa, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000300)=0x1, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @empty}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) r5 = accept(r1, 0x0, 0x0) dup2(r0, r5) 14:10:07 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 186.651490] IPVS: ftp: loaded support on port[0] = 21 14:10:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.origin\x00', &(0x7f0000000240)=""/190, 0xbe) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$netrom(r1, &(0x7f0000000340)=""/24, 0x18, 0x143, &(0x7f00000003c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$TCGETS(r1, 0x5401, &(0x7f00000001c0)) sendto(r0, &(0x7f0000000080)="f04bae9d90c2ee1c27b0a4933349070e7188adf3dabe3469ad4aee623093c317dde8119c167b1c7c8c65a979ed080279a28d0cfd0b5117addad5d936ea203402f545505bfa7875321ee40f89969d36f3f685d1432f2c2fb4bd65b677ec40221fbec51a02c398b3d3aa2a388ca3f60a76ca9bc588377a0ca58ef5ee9c6a398cc7d1677d86c604afca6a29ec09b30c567f93cda5d076b3ab386f97366a13c5ebd98810acf6ebc89aef8e", 0xa9, 0x800, &(0x7f0000000140)=@sco={0x1f, {0xffffffffffffff01, 0x7fffffff, 0x10001, 0x2, 0x400, 0x672a}}, 0x80) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="0200002b68b2ade9"], 0x8) restart_syscall() 14:10:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_setup(0x1, &(0x7f0000000300)=0x0) io_submit(r1, 0x1, &(0x7f0000000640)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xb0040, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000000c0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 14:10:08 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) r0 = semget$private(0x0, 0x3, 0x80) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000180)=0x4) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x701000) r2 = openat$cgroup_ro(r1, &(0x7f00000006c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5@U\xd8K\a8\xf7\x80\x03\xcf\xcc\xa4\xcb:\x9c\xd1=\xce\xa4@\xd8\x99\xc2,7M\xd3L_\xca\x1a\xfd\xe2e\x98\x8f\xfd4Ju\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd)\xaa\xf6\x80\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\xdfK\x1d\xeeH;\x15v$\xc5\xbc\xd1\x9e\f\x86\xd9\xd2v6\x7f\xc4\xcaOSu\x04\xd5\\\xc5\xa1Mt\x93\x84\x9c\xe2/w\xc3~\xd3j}\x8a)\x877w\xcd\xfc\x18n\xe6C\x81\xcf\xaa!\x14\x1d\xf8P\x88\xbe\xf3\x93R\xc0IM\x89[\xbaZJ\v%(\xe90\xe5\x8b\xd0\x84T\xb0\xa4\xb48\xfea\\\x80\xe6\x9e[\xa8\xd1\xcc\xcb\xa2l\x8e\xe8\x87~\xbd \xb1&\xc05\bb\xb1\xd4\xec\xed\x1a\xafv\xb0Q\xfa\xf1\xef\x85AV\x9b\xb4re\xc4\x1f\xfc\xa8\x03\xce\x7f\xb6\xc9I\xeaG\x11\x8a\xd5\x18\xd1N\xd9\xf7\xc0\x8d\x80\xc4\x11a)R\xb7\xca\x00\x00\x00\x00\xb8WIm\xb3\x05\x93\xf0\x14\x8abZDV+c\xaaX\xf0\x03\xed\xd5-D\\\xf59\x89s\x9d\xe4\xc28)3\xd1\x1f \x96\ts\xe3\xe7\x84\x9e\x84&\xb6\x992\xaei\xe6^]\xa7\x83\x81\xee\xc8$\xf6\xd7\x16\x8e\x15B\xcd\x87\x8f\'\xe5j\x9f+[\xea\xf9\xec[#\xa4\xf5?\xc9\xad\xe5,\b\xfd\a\x89\xa4\x9e\xb7\x95EW.\xe1/q\"(\xcc\xd3\x8f\xf9r\xb5\x9f\xa9\x12\xdb\xf8:\xda\xaa\xee\x91\xcc<\x97\xb7Aa\xb3\xff\a\x90\xfc^\xaf\xe3 Z\xf3{&wp\x01\xf7ZW\x1c:\x80\xb3i\xb1@\x9a\x94B\a+\x8a\x98Z\xbd\x80\xc1\xaa\xf3\x0f\xb2\x06&\xe282|d\x96\aD\r\xf8\xa5\x1c\x06\xeb', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x1}, 0xcf) close(r3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:08 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)=0x7ffffffffffffd) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:iptables_initrc_exec_t:s0\x00', 0x2c, 0x0) 14:10:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 187.526680] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 14:10:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) [ 187.588001] audit: type=1400 audit(1564927808.175:53): avc: denied { associate } for pid=7820 comm="syz-executor.4" name="/" dev="sysfs" ino=1 scontext=system_u:object_r:iptables_initrc_exec_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=filesystem permissive=1 14:10:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffea7) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r2 = add_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000780)="d457a516c885a48c5a4a36144f395f4de3aceaf566f0cc0616f46d312f9d249f6ef8bdcfb6ac9c6656aca79e1b6e3ca17ca46c1bf127cfd34794fa31912e7231dbb9785cbc78c25a9225c3cddb4e1fd4307131ae0e1dfcf61592eb8f30e33cdf0aed65f6cf610f32b159b1101da891f09c584ddb3c0bbb33eeb2c5a37c515f701a590d8f0689d42c34bdd179c2e6aa13dd87cd8026e114fb6e9f433df0fba29db4a84d663966b2acc8e5ec0df1ef970f5fff2c6c231aecf0", 0xb8, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = socket$inet(0x2, 0x1, 0x0) renameat2(r1, &(0x7f0000000280)='./file0\x00', r1, 0x0, 0x0) getpeername$unix(r1, &(0x7f00000004c0)=@abs, &(0x7f0000000340)=0x66) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) clone(0x2200802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000003c0)) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x12}) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGVERSION(r5, 0x80044501, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000140)={0x1, 0x400}) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000400)="cda28a8ce5b9f802fc4fb64f0aba91fe934c9610f9ea3d31892fb1fab5fd154b6fc1f5484b4d34e2baf57b1610", 0x2d}], 0x1) open(0x0, 0x2, 0x48) fstat(0xffffffffffffffff, &(0x7f0000000700)) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@mcast1, 0x4e21, 0x6, 0x4e23, 0x0, 0x2, 0x20, 0x20, 0x2}, {0x4, 0x4, 0x0, 0xfffffffffffffbff, 0x0, 0x23c, 0xc21c}, {0x0, 0x0, 0x6, 0xe2a7}, 0x3, 0x0, 0x2, 0x1, 0x3, 0x3}, {{@in=@broadcast, 0x4d2}, 0x2, @in=@broadcast, 0x3501, 0x3, 0x2, 0x0, 0xffffffffffffffc1, 0x5, 0x8}}, 0xe8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x5) 14:10:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0xa6fe, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x0, 0x2) 14:10:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 187.716944] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 14:10:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 187.762043] XFS (loop2): unknown mount option [subj_type=syz0]. [ 187.779020] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 187.834604] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 187.882639] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 187.928190] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 187.963075] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.019172] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.070613] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.077422] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.084182] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.090920] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.097596] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.097620] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.097631] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.097643] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.124537] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.131372] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.138045] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.138058] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.138071] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.138082] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.164862] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.173008] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.179765] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.186844] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.193688] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.200722] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.207495] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.215738] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.222724] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.229481] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.236605] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.243417] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.251430] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.259355] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.266810] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.273635] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.292114] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.298853] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.306409] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.313234] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.319923] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.327328] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.334173] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.341256] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.348022] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.355148] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.361963] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.368716] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.375964] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.382773] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.389526] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.397626] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.405288] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.412115] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 14:10:09 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) r0 = semget$private(0x0, 0x3, 0x80) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000180)=0x4) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x701000) r2 = openat$cgroup_ro(r1, &(0x7f00000006c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5@U\xd8K\a8\xf7\x80\x03\xcf\xcc\xa4\xcb:\x9c\xd1=\xce\xa4@\xd8\x99\xc2,7M\xd3L_\xca\x1a\xfd\xe2e\x98\x8f\xfd4Ju\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd)\xaa\xf6\x80\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\xdfK\x1d\xeeH;\x15v$\xc5\xbc\xd1\x9e\f\x86\xd9\xd2v6\x7f\xc4\xcaOSu\x04\xd5\\\xc5\xa1Mt\x93\x84\x9c\xe2/w\xc3~\xd3j}\x8a)\x877w\xcd\xfc\x18n\xe6C\x81\xcf\xaa!\x14\x1d\xf8P\x88\xbe\xf3\x93R\xc0IM\x89[\xbaZJ\v%(\xe90\xe5\x8b\xd0\x84T\xb0\xa4\xb48\xfea\\\x80\xe6\x9e[\xa8\xd1\xcc\xcb\xa2l\x8e\xe8\x87~\xbd \xb1&\xc05\bb\xb1\xd4\xec\xed\x1a\xafv\xb0Q\xfa\xf1\xef\x85AV\x9b\xb4re\xc4\x1f\xfc\xa8\x03\xce\x7f\xb6\xc9I\xeaG\x11\x8a\xd5\x18\xd1N\xd9\xf7\xc0\x8d\x80\xc4\x11a)R\xb7\xca\x00\x00\x00\x00\xb8WIm\xb3\x05\x93\xf0\x14\x8abZDV+c\xaaX\xf0\x03\xed\xd5-D\\\xf59\x89s\x9d\xe4\xc28)3\xd1\x1f \x96\ts\xe3\xe7\x84\x9e\x84&\xb6\x992\xaei\xe6^]\xa7\x83\x81\xee\xc8$\xf6\xd7\x16\x8e\x15B\xcd\x87\x8f\'\xe5j\x9f+[\xea\xf9\xec[#\xa4\xf5?\xc9\xad\xe5,\b\xfd\a\x89\xa4\x9e\xb7\x95EW.\xe1/q\"(\xcc\xd3\x8f\xf9r\xb5\x9f\xa9\x12\xdb\xf8:\xda\xaa\xee\x91\xcc<\x97\xb7Aa\xb3\xff\a\x90\xfc^\xaf\xe3 Z\xf3{&wp\x01\xf7ZW\x1c:\x80\xb3i\xb1@\x9a\x94B\a+\x8a\x98Z\xbd\x80\xc1\xaa\xf3\x0f\xb2\x06&\xe282|d\x96\aD\r\xf8\xa5\x1c\x06\xeb', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x1}, 0xcf) close(r3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:09 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000025, &(0x7f0000000000)=0x1, 0xfffffffffffffef3) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f00000001c0)) sendmmsg$alg(r0, &(0x7f0000007300)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@op={0x10}], 0x10}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) 14:10:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 188.418898] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.431544] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.439901] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.459037] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 14:10:09 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 188.467516] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.475422] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.482234] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488917] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488930] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488943] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488956] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488968] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488979] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.488991] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489001] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489013] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489024] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489034] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 14:10:09 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 188.489045] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489056] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489067] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489077] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.489089] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.624051] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.636683] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.667238] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.678047] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.693655] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.708922] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.721023] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.727806] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.739468] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.747620] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.757984] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.766743] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.777092] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.785455] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.795905] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.804257] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.846457] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.857613] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.864677] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.875781] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.882699] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.889497] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.901800] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.908538] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.918249] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.927086] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.936045] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.945045] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.954012] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.964432] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.973388] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.983556] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.993042] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 188.999752] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.008803] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.017691] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.026767] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.035621] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.045308] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.054461] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.063365] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.072908] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.082240] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.089337] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.098350] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.107189] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.116221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.123020] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.129710] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.136655] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.143379] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.150102] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.156852] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.163570] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.170286] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.177005] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.183750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.190558] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.197221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.204141] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.210943] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.217626] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.224362] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.231075] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.237745] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.244466] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.251199] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.257873] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.264595] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.272852] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.280369] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.287156] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.293924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.300657] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.307352] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.314286] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.321051] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.327739] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.334488] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.341196] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.347860] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.354602] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.361324] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.367999] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.374734] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.381464] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.388147] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.394872] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.401579] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.408240] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.414973] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.421695] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.428364] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.435114] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.441881] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.448572] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.455330] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.462023] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.468708] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.475433] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.482137] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.488799] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.495519] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.502244] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.508912] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.515635] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.522334] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.528999] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.535730] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.542437] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.549096] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.555833] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 189.565254] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 189.590949] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.609714] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.617315] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.624891] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.640890] XFS (loop2): unknown mount option [subj_type=syz0]. [ 189.663532] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.674144] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.682177] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.688890] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.688902] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.707365] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.715112] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.726027] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.732887] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.739566] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.748917] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.755703] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.762583] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.769276] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.776005] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.782766] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.789544] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.796282] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.802991] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803004] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803016] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803027] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803039] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803050] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803062] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803073] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803083] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803094] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803115] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.803127] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.816584] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.829893] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.844352] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.857674] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871090] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871103] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871114] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871126] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871138] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.871150] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.884576] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.897817] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.912966] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.925660] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.938896] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.952396] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.965990] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.985770] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 189.999078] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.012564] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.025908] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.032671] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.039396] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.046229] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.052943] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.059613] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.066341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.073107] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.079785] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.086502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.093247] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.099935] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.106661] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.113388] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.120106] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.126786] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.133507] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.140217] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.146890] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.153666] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.160376] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.167046] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.173771] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.180478] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.187153] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.193874] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.200584] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.207259] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.213977] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.220779] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.227507] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.234275] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.241020] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.247742] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.254502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.261256] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.267995] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.274777] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.281530] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.288260] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.295026] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.301780] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.308501] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.315263] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.322015] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.328723] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.335467] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.342231] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.348961] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.355715] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.362467] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.369192] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.375944] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.382699] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.389423] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.396215] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.402965] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.409689] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.416452] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.423218] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.429930] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.436675] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.443421] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.450171] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.456905] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.463664] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.470452] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.477178] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.483939] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.490710] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.497432] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.504200] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.510962] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.517682] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.524521] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.531283] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.538004] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.544756] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.553710] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.560491] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.567240] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.574013] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.580792] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.587802] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.594803] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.601601] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.608336] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.615097] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.622234] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.628965] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.635759] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.642517] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.649245] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.656003] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.662841] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.669566] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.676320] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.690072] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.696772] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.703500] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.710227] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.716926] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.725014] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.731725] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.738433] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.745158] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.751884] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.758558] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.765283] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.771990] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.778662] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.785388] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.792302] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.799012] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.805746] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.812500] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.819178] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.825907] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.832640] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.839312] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.846033] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.852733] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.859401] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.866111] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.872800] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.879475] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.886228] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.892947] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.899621] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.906337] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.913049] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 14:10:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 14:10:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000f0ffffff00000000380000000000000060798e380000200000000000002100000000000000000000000000000052299f3000000000000000000000000000000000000000000000007426f1103e627fff9d2f194663f767a217a209118627f0aff25ed1a371bfbd155de9302e30893c36544e535b398203f0c1cbb74f42cba8e2271fabdbda1e74818531cf0ae496aec96ed165222462d2e53ac2c8c13db301e3ec9999203a4b"], 0xba) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000340)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10003, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000440)={0x0, 0x4}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000004c0)={r4, 0x3}, &(0x7f0000000500)=0x8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000180)={0x0, 0x101000}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) splice(r3, &(0x7f00000001c0), r5, &(0x7f00000002c0), 0x80000000, 0x8) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:10:11 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) ioctl$TCXONC(r1, 0x540a, 0x9) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x32) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000180)='batadv0\x00') ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80000000, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="1b4638837fcbccc6215f9d926ff4eee0907c5c117fd2", 0x16, 0x9}, {&(0x7f0000000600)="8e6f9e7d862bf7f9f4dbbf34a9da32c86fe05bb2644cb92ae606921a18ab4898215fc9c2b63e860e527713722b9934250f4ab59e3761988f951db1b1dcbbfb32d53524ab3da35154ee318b321a29a3e6e3faac582517ae79cf17b21cc483df02fd3fb7924f0a79561168b38076b183f691c3d765baea8b64d7ed1cbc40420e9ffd66df", 0x83, 0x3}, {&(0x7f0000000240)="e72595c57bf2b6d667ef1b8fc8ebf430652d334115905c3780c0e1d0a227065d88ea6ffccb7e28f372bb8ddc360f256741354b0146133a77fa9ae539a6d0b6f832e4231796806bac177dfbb7ade13dd5e14b3a8f8a732dfe96a5180db6812c207056f8850a17875eca1bcb10a3ac6cd47fd377df316015c464943cb4cba8b53dd79101fd3bf630845b661875b9b2725bc069a4252c1cb8dbe4e910625fd18d0900faf4c91b7ca66557227d4c3c107c19fd67e449b5c90defd619994529be9cf4a29e6c383ecde6abc5320c1822dcbaedefe2c4491c22dab440cf57ad", 0xdc, 0x7fffffff}, {&(0x7f0000000340)="aea061bee9efa1862d82791b616957c38c466dd40b9544568a9c3f2a30d39e1f8b72a8d3f7daaebb78fad418a06e60e4b448581a009ef786317811d35acd451445e8aef3dc6de98ff8e6b5c9907d1adef2c5cac0401e420f90f898a075d26251ba187654cddaf3f1218748cbe0812cbbd1d0deab2ab9810263596306a8be3ddfc3e99cc8b86d6a3adc1ff65b6a2c325ca28fc9757433f626825604e98d", 0x9d, 0x380}, {&(0x7f0000000400)="a7b44cee5a3dcf69bd4ee54a15cc4069cf7a02f0c78bd9297d8ca27ae3e74c119ca0e3d8ab76be32a4d3f380bd819d5b00cc07dd423a5d0476b9a9b8ed805376aac4fc81680ac75152bccc3d84294b5d041116b77a2198bcf7118b023566a51c11d8081a7b5f29e3a530bf0d6a23742875b0d9a496ec46fa9e7dd3d6fc", 0x7d, 0x1}, {&(0x7f0000000480)="4ef106ebced0f5c19753109b2b02aaa9860632ca1147c7aef5b040174d7155492b2d97dead481185a04042e6e640a1619a353f4200106fb69d2f7b2aaaa6e67d1454e0b7e1024f20f86f6509c84d97fd6e6e61a6fc1f72a838cec6ba816df794bf903ae9d4cd3bfb6a5da9880f92403aa8e1cb66f8b084960284035169054cea983a358e6a1884dc251d5f2424776a45203e61e6ff3dba916193c7f716b1b8d7d213c569b4f1b9a0", 0xa8, 0x1f}]) 14:10:11 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x0, 0x5, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x7f77775d, 0x3, @stepwise={0x0, 0x6, 0x2, 0x0, 0x5}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={r0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) r1 = getpgrp(0x0) mkdirat(0xffffffffffffffff, 0x0, 0x9) setpriority(0x0, r1, 0xffff) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692}]}, 0x18, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000ac0)=""/4096) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000100)=[0x0]) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) capset(&(0x7f00000007c0)={0x19980330}, 0x0) [ 190.919743] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.926468] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.933185] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.939847] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 190.947678] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 14:10:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:11 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 191.026109] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.054238] XFS (loop2): unknown mount option [subj_type=syz0]. [ 191.095695] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.126212] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 14:10:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:11 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 191.202012] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.244189] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.274242] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 14:10:11 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x10000, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, 0x0) listxattr(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)=""/167, 0xa7) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) getpid() r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x9, 0xa00) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000400)) r3 = open(0x0, 0x20000000000000, 0x0) socket$rxrpc(0x21, 0x2, 0x0) r4 = dup2(r1, r3) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000640)) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000100)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000740)=0x400, 0x4) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0xfffffffffffffffe) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f00000007c0)={0x5, &(0x7f0000000780)=[0x7, 0x8001, 0x6, 0xfe3, 0x2]}) execve(&(0x7f0000000a40)='./file0/file1\x00', &(0x7f0000000500)=[&(0x7f00000000c0)='\x00', &(0x7f0000000140)='\x10\xfa,;\xf4\x1eRD\x00', &(0x7f0000000180)='\'-user#proc!@trusted\xbd\x00', &(0x7f00000001c0)='&\x00', &(0x7f0000000200)='\x00', &(0x7f0000000ac0)='B\x9b\x1br\xce\xfch\x06N\x99\xb8V\xe4\xc4\x88\x1e2\x05\xed\xfb\xa3t\x83\x96^\x83\x8b\xf5\x03\xc9\xec\xe2X\x03\x98:\xd3j\xd0\x1c\xe3U\xd2\x84\x15\xf8\xd7\xd36\x05S\xb9t\x03\xea\xe8\xeb\xfb\xd7\b\rx\xff\x9f?\x01\x03)\xd16\xb1\xf5\f\xa6\x14\x90\xa0~r\xe3\xeb\x1c\xc4\x01\x04\x04\x16\xa6\xcf\xbb#\xa0y\x0e\x8c\xd9\xb2i\xe6\xa4\x8f\x05UjSC\xfcV/u\x92\xc4$\xe8\xb4q\x94\xf6\xe1\x1a\x1e\x9c\xdb\xf8?\x8f+\xd5\xca\x05\x8f\xc0V\xb2\xcd\xbfn\xb3O\xd2YD\x1f\x8e\x03\xde\xdb\xf7\xf4\x80\xf1\x0e\xfc\xfa\x89\xc8\xf8\xdeXgo\x05\x14\xee\xf0\rk\xae\xd4\xc8Bx\xa3\xe6\x00\x00\x00\x00\x00\x00\x00\b\xf3\xe0uD\xd2\xb3\x87,\xa9g\x8fv\x88\\\x0e\xf6d\\\x0f\x00\x00\x00\x00\x00', &(0x7f0000000a80)='\x01\x8a\xf7?s\xd4\x17n\xce|\x00', 0x0, &(0x7f0000000480)='([cpusetvmnet1\x00', &(0x7f0000000bc0)='$eth0\x00'], &(0x7f0000000600)=[&(0x7f0000000580)='proc\x00', &(0x7f00000005c0)='^}ppp1%vboxnet1{-\x00']) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000440)=0x5) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000680)={0x2, 0x0, [0x0, 0x0]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) ioctl$SG_GET_REQUEST_TABLE(r6, 0x2286, &(0x7f0000000280)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1) renameat(r4, &(0x7f00000006c0)='./file0\x00', r4, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) getsockopt$inet_tcp_buf(r6, 0x6, 0xc8d61adc8bc8f849, &(0x7f0000000900)=""/184, &(0x7f0000000080)=0xb8) 14:10:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 191.301916] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.345468] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.381111] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.400434] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.418155] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.451451] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.458217] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.490450] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.497177] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.506606] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.513587] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.520671] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.527350] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.534309] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.541114] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.547792] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.555720] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.563160] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.569846] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.576674] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.583656] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.591818] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.598513] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.611293] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.617994] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.628951] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.650233] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.656951] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.680088] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.686880] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.700162] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.707038] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.735746] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.743135] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.760201] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.770563] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.777277] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.787078] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.793893] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.800638] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.807311] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.814276] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.821038] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.827712] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.834985] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.841812] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.848494] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.855280] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.861990] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.868655] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.875377] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.882103] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.888767] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.895500] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.902211] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.908878] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.915621] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.922329] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.928995] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.935725] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.942435] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.949103] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.955832] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.962565] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.969335] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.976045] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.982826] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.989503] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 191.996443] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.003161] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.009823] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.016536] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.023251] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.024163] IPVS: ftp: loaded support on port[0] = 21 [ 192.030083] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030097] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030108] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030121] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030133] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030145] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.030158] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.082060] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.088724] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.095423] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.102131] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.108790] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.115493] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.122191] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.128848] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.135540] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.142368] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.149056] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.155758] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.162455] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.169128] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.175837] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.182540] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.189207] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.195974] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.202724] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.209407] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.216303] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.223022] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.229683] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.236406] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.243113] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.249777] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.256498] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.263249] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.269916] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.276639] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283351] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283364] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283396] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283407] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283418] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283434] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283446] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283457] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283468] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283478] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283489] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.283500] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.296935] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.296948] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310344] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310357] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310369] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310381] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310393] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.310405] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.323776] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.337048] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.337061] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350450] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350464] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350476] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350487] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350499] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350511] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.350523] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.363928] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.377281] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.390675] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.390688] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.404092] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.417385] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.524058] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.530786] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.537473] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.544175] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.550923] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.557872] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.564600] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.571420] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.578092] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.584810] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.591533] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.598298] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.605004] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.611727] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.618399] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.625110] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.631987] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.638660] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.645361] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.652092] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.658763] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.665475] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.672210] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.678878] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.685597] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.692325] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.698995] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.705721] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.712453] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.719122] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.725838] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.732564] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.740427] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.747096] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.753840] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 14:10:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 14:10:13 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="ad16b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000014c0)={@rand_addr, @broadcast}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000100)={0x3, @default, r3}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000018c0)=0x1) openat$cgroup_ro(r0, &(0x7f00000019c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) futex(&(0x7f0000001900)=0x2, 0x8b, 0x2, &(0x7f0000001940)={0x0, 0x989680}, &(0x7f0000001980)=0x1, 0x1) sendto$unix(r2, &(0x7f0000000100), 0x14ded905162a6c92, 0x0, 0x0, 0x13157855e8132573) perf_event_open(&(0x7f000000a200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:10:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@dev={[], 0x1b}, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "bb5615", 0x44, 0x2f, 0x0, @remote, @local, {[], @gre={{0xffffca88, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) [ 192.760559] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.767253] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.774007] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 192.781806] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 14:10:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x1c, 0x4}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0xa1, 0x4) fanotify_mark(r2, 0x4000000000005, 0xa, r1, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) fanotify_mark(r2, 0x80000000025, 0xa, r1, 0x0) 14:10:13 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 192.861825] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 192.868714] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 14:10:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="ad16b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000014c0)={@rand_addr, @broadcast}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000100)={0x3, @default, r3}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000018c0)=0x1) openat$cgroup_ro(r0, &(0x7f00000019c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) futex(&(0x7f0000001900)=0x2, 0x8b, 0x2, &(0x7f0000001940)={0x0, 0x989680}, &(0x7f0000001980)=0x1, 0x1) sendto$unix(r2, &(0x7f0000000100), 0x14ded905162a6c92, 0x0, 0x0, 0x13157855e8132573) perf_event_open(&(0x7f000000a200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 192.906872] XFS (loop2): unknown mount option [subj_type=syz0]. [ 192.921392] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 14:10:13 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 192.952934] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.004017] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.026372] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 14:10:13 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000240)="24000000280007003200000804367700ff7f00000100000000eefffffeffffff0100ff10", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @broadcast}, 0x8) 14:10:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 193.061972] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.068718] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.077654] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.087678] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.104749] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.125814] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.132947] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.139657] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.149025] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.155827] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.162941] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.169642] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.169654] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.183499] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.193685] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.200804] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.208094] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.219188] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.225958] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.235122] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.241902] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.248572] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.257844] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.264584] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.274150] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.280855] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.287513] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.296620] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.303355] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.312583] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.319264] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.326010] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.332870] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.339591] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.346311] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.356507] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.363256] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.369924] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.379428] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.386153] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.396140] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.402883] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.409554] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.418650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.425369] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.432260] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.438934] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.438947] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.452352] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.452366] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.452379] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.472504] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.479210] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.485932] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.492645] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.492658] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.492670] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.506039] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.519405] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.526172] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.526185] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.526197] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.526208] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.546173] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.560796] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.574180] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.580928] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.587688] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.597536] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.604268] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.613360] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.620193] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.626861] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.626874] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.626886] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.644118] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.653804] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.662906] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.669615] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.676365] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.685930] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.692668] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.699336] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.708625] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.715367] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.725752] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.732502] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.739168] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.748276] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.755131] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.765206] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.771996] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.778671] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.787745] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.794481] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.804516] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.811259] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.817923] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.827088] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.833810] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.843626] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.850373] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.857042] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.866150] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.872889] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.879555] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.889442] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.896212] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.905331] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.912159] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.918830] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.925609] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.932341] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.932358] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.945709] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.945721] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.945734] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.945746] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.972577] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.979250] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.985968] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.992720] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 193.999402] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.006141] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.013400] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.020165] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.026843] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.026857] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.026868] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.040313] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.056516] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.063238] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.069900] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.079056] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.085781] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.092562] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.099234] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.105948] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.112670] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.112683] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.112696] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.112707] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.126083] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.146069] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.152815] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.159485] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.166197] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.172916] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.179584] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.186312] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.193068] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.199746] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.206475] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.213241] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.219914] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.226641] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.233402] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.240110] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.246786] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.253526] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.260237] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.266916] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.273662] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.280373] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.287047] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.293779] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.300487] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.307163] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.314437] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.321162] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.327844] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.334602] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.341310] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.347992] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.354729] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.361441] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.368206] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.374947] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 14:10:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 14:10:15 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0xeb12, 0x8001, 0x7f, 0x5, 0xbb0, 0x5, 0x4, 0x8}}) getsockname(r0, 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r3, 0x65, 0x10000000005, &(0x7f0000000000)="e1affde3", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_raw(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r4}, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "552f30fc1e5e162e"}, 0x10}}, 0x0) 14:10:15 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x16, "06f73a5d0760af569c17ba767f266ff593e91f2acf63"}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000080)={&(0x7f000001c000/0x2000)=nil, 0x1, 0x0, 0x0, &(0x7f000000c000/0x4000)=nil, 0x5}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1f6, 0x0, 0x0, 0x2a2) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:10:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 194.381650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.388329] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.395180] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.401896] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.408582] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.415324] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 194.423321] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 194.505955] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 14:10:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x1c, 0x4}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0xa1, 0x4) fanotify_mark(r2, 0x4000000000005, 0xa, r1, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) fanotify_mark(r2, 0x80000000025, 0xa, r1, 0x0) 14:10:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:15 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec", 0x4) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0xf}, {&(0x7f0000000780)=""/98, 0x1e9}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4, &(0x7f0000000440)=""/45, 0x2d}}], 0x4000000000000e9, 0x0, &(0x7f0000000640)={0x77359400}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400040, 0x0) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f00000000c0)={0x4c01, "cac2386cbe40b3e50867ddd7b9c11e5953ee46ca93180803315ee645766300", 0x5, 0x1000000000000001}) [ 194.555130] XFS (loop2): unknown mount option [subj_type=syz0]. [ 194.562734] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.618102] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 14:10:15 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 194.676558] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 14:10:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x3, 0x88, 0x2, 0x3, 0x0, 0x2000000, 0x3ca, 0x40, 0x2b1, 0x2, 0xffffffffffffffff, 0x38, 0x1, 0x3, 0x9}, [{0x7, 0x3, 0x10000, 0xff, 0x8001, 0xbbd, 0x0, 0x1}, {0x6474e551, 0x7, 0x401, 0xffffffffffffff92, 0x3, 0x1000, 0x9, 0x8fe2}], "40cc8d75137a79f9de6e7267769d03ceec04e77a91305ef7ec77e3094880d61fefd7cbcb5990cc17bf0398ec4d07ba4be2d3560eb5d2677910b4bd5066cdd8c6e8fc1728f5d8acbe34bcd9263f2fe54e494b1e100855678bbfeb733b62b6ff16d442226c45debc0397d4c36be89a9828b7f2ec6b99fdd9e83f625134f25cb1c9ae6fd44923b4b58d410131428e7f3f5aa6a4d184b1355250a6a588d069abdf7fe6b5eacecef147208fb466d39d4b97873d078e8e6e4bf6a0ec894ff775bde6adaa9e5b8155ede8b36d455b", [[], [], [], []]}, 0x57b) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbff, 0x1000010}, 0xc) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, 0x0) [ 194.735672] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.785375] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.807136] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.822103] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.831873] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.838752] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.847202] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.854056] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.861130] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.868078] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.874940] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.881722] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.888453] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.895424] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.902208] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.908934] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.915732] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.922512] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.929232] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.936007] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.942783] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.949504] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.964464] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.973077] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.980767] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.987539] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 194.994373] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.001252] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.008636] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.015522] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.022310] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.029024] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.035812] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.042592] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.049320] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.056171] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.062937] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.069659] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.076614] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.083376] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.090133] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.096861] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.103623] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.110438] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.117162] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.123920] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.130685] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.137402] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.144156] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.150943] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.157663] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.164429] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.171194] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.177916] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.184690] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.191466] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.198207] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.204976] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.211738] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.218498] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.225276] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.232058] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.238780] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.245557] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.252332] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.259049] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.265824] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.272603] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.279360] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.286130] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.293072] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.299812] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.306577] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.313349] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.320102] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.326847] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.333627] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.340376] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.347094] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.353887] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.360664] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.367391] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.374130] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.380936] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.387692] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.394445] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.401172] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.407863] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.414602] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.421326] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.427994] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.434858] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.441612] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.448305] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.455052] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.461803] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.468495] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.475248] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.481977] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.488654] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.495381] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.502101] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.508779] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.515702] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.522499] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.529184] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.535945] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.542687] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.549386] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.557689] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.564445] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.571198] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.577885] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.584621] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.591366] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.598051] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.604961] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.611688] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.618369] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.625102] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.631817] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.638479] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.645255] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.651967] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.658635] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.665386] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.672250] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.678974] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.685754] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.692519] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.699234] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.706018] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.712788] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.719505] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.726307] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.733052] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.739727] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.746477] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.753216] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.759895] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.766659] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.773398] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.780122] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.786808] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.793650] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.800406] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.807082] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.813828] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.820573] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.827276] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.834019] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.840769] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.847441] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.854165] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.860879] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.867538] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.874266] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.880969] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.887635] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.894365] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.901109] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.907784] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.914515] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.921219] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.927881] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.934602] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.941306] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.947969] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.954708] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.961537] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.968206] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.974937] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.981640] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.988304] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 195.995038] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.001741] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.008405] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.015138] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.021874] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.028541] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 14:10:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) 14:10:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x7fff, 0x0, 0xff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x2000000) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000380), &(0x7f0000000140)=0x68) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4242, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0xffffffffffff33ef, 0xbe4, 0x301f, 0x4, 0xe, 0x3, 0x2, 0x7}}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa48204) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4002, 0x0) r5 = openat(r4, &(0x7f00000002c0)='./bus\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000300)=0x3, 0x2) ioctl$VIDIOC_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$VHOST_GET_VRING_BASE(r4, 0xc008af12, &(0x7f0000000340)) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) 14:10:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:16 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x49ad, 0x0, 0x0, 0x12, 0x0, 0x0, "db693138e8e727295a3d985d83ad8fe0518b75ec5cb245b505e8cf456fe70bead780f15048470edb702ca3eaa3332c5e4511d0cdfb04d07025c070f1b4f01ac6", "757c08956c8f5517fa4c92ba6f2eaa620e357c3a6c730906dd17241c2269f9c35e959941291498b8b088241750d902fff9112129e335601d7a3e07c71eb87a40", "8054a040060010d3a864074202f68f00"}) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20008081) [ 196.035267] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.041968] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.048632] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.055352] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.062054] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.068719] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 196.076714] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 14:10:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="d7eb9de51b1cca36f06a7aa17853", 0x0}, 0x3a7) [ 196.117254] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.142104] XFS (loop2): unknown mount option [subj_type=syz0]. [ 196.153390] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 14:10:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000040)=0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000140)=0x400100000001, 0x7) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180), 0x4) rt_sigqueueinfo(r2, 0x18, &(0x7f00000000c0)={0x0, 0x0, 0xffffffff}) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 196.178609] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 14:10:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x4d8401) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x2000}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2802) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x4000000) bind$isdn_base(r1, &(0x7f0000000240)={0x22, 0x20, 0x8, 0x5, 0xb6}, 0x6) ioctl$NBD_DISCONNECT(r2, 0xab08) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f0000000100)=[{r2, 0x8088}, {r1, 0x4100}, {r0, 0x4008}, {r2, 0x400}], 0x4, &(0x7f0000000180)={r3, r4+30000000}, &(0x7f00000001c0)={0x6}, 0x8) r5 = semget(0x1, 0x0, 0x4) semctl$GETPID(r5, 0x3, 0xb, &(0x7f0000000200)=""/41) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000003000/0x3000)=nil) 14:10:16 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 196.221510] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.267481] audit: type=1800 audit(1564927816.845:54): pid=8072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16681 res=0 14:10:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 196.314687] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 14:10:16 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 196.364367] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.408647] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.437908] audit: type=1400 audit(1564927816.855:55): avc: denied { map } for pid=8082 comm="syz-executor.4" path="/dev/sg0" dev="devtmpfs" ino=14884 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 196.468382] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.476431] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.493641] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.512382] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.519100] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.533416] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.543028] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.549841] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.564894] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.573025] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.579717] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.589843] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.598116] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.608643] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.617009] audit: type=1800 audit(1564927817.205:56): pid=8072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16681 res=0 [ 196.664178] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.677847] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.694270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.707950] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.714771] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.722550] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.729326] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.736085] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.743081] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.749772] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.756532] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.763255] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.769927] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.776693] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.783426] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.790189] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.796890] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.803732] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.810483] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.817148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.823876] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.830604] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.837274] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.843994] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.850800] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.857469] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.864190] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.870929] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.877606] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.884345] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.891088] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.897759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.904477] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.911187] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.917864] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.924581] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.931302] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.937980] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.944712] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.951538] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.958230] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.964974] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.971705] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.978390] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.985161] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.991873] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 196.998555] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.005274] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.012027] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.019131] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.025861] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.032576] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.039263] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.046000] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.052752] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.059426] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.066198] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.072922] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.079588] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.086317] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.093026] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.099703] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.106424] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.113203] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.119867] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.126600] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.133315] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.140110] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.146809] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.153556] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.160265] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.166926] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.173656] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.180350] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.187015] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.193735] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.200452] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.207125] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.213844] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.221133] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.228254] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.234998] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.241702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.248384] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.255142] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.261839] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.268516] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.275277] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.281989] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.288654] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.295375] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.302130] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.308804] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.315525] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.322232] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.328904] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.335636] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.342333] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.348993] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.355796] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.362513] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.369183] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.375923] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.382646] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.389318] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.396046] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.402749] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.409414] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.416147] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.422850] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.429511] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.436254] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.442980] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.449653] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.456378] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.463113] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.469806] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.476569] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.483302] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.489981] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.496724] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.503461] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.510341] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.517032] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.523767] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.530491] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.537161] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.543895] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.550622] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.557371] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.564087] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.570799] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.577464] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.584206] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.591254] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.598061] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.604782] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.611513] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.618178] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.624894] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.631645] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.638414] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.645136] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.651847] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.658514] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.665233] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.671997] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.678697] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.685420] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.692129] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.698808] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.705545] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.712264] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.718926] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.725649] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.732357] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.739025] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.745742] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.752474] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.759133] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.765872] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.772584] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.779245] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.785958] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.792663] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.799321] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.806088] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.812798] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 14:10:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:18 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=',') 14:10:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x7fff, 0x0, 0xff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x2000000) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000380), &(0x7f0000000140)=0x68) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4242, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0xffffffffffff33ef, 0xbe4, 0x301f, 0x4, 0xe, 0x3, 0x2, 0x7}}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa48204) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4002, 0x0) r5 = openat(r4, &(0x7f00000002c0)='./bus\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000300)=0x3, 0x2) ioctl$VIDIOC_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$VHOST_GET_VRING_BASE(r4, 0xc008af12, &(0x7f0000000340)) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) 14:10:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000002500)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) socket$nl_xfrm(0x10, 0x3, 0x6) [ 197.819478] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 197.827460] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz0 [ 197.887849] audit: type=1400 audit(1564927818.465:57): avc: denied { create } for pid=8110 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 197.926979] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 14:10:18 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=',') 14:10:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f00000000c0)='./file0/file0\x00') mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.#file0,workdir=./fihH\x00']) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)='overlay\x00', 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f0000000340)="0c3462adce468245c96acdf4c7e4cf50b1654f2ce2749dced6696a5183b5946e406aa945bc5d830160e5d233189b9fd306573b227f22e3da4009ce96573b83cf7efd3386b2c182fedabc57d8419bd3c8f715422ca28507a1655918cee9ec23e23a032cb9b4d4f39aeb50ddd277855d8b57850505792262d34d9a92b15ae736204536f884f6f7d06505d681f238b44454dfb5320f8b0bda270fa592a62ea5b9bdd295401a66", 0xa5) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='.//ile0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0/file0\x00', 0xe, 0x3) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0xa0002, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000740)=0x40, 0x4) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000540)='./file0/f.le.\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000480)='nodev:wlan1wlan0proc\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x1004000, &(0x7f0000000800)=ANY=[@ANYBLOB="7472616e733d78f90908656e2c70726976706f72742c6163636573733d616e792c706f73697861636c2c76657273696f6ebd3970323030302e4c2c64656275673d3078303030303030303030303030303038302c6673757569643d7777616377cf562b81f788061975e23835352d773739002d6439777f2d353439392d3f653831333039632c726f6f74636f6e746578743d73797361646d5f752c736d61636b66737472616e736d7574653d212c726f6f74636f6e746578743d73797361", @ANYRESDEC=r3, @ANYBLOB=',pcr=00000000000000000019,smackfsroot=/,\x00']) syz_open_pts(r2, 0x88000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 197.938262] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 197.959579] XFS (loop2): unknown mount option [subj_type=syz0]. [ 197.991255] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.005754] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.015709] overlayfs: failed to resolve './fihH': -2 14:10:18 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)=',') [ 198.034685] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 198.046703] 9pnet: Could not find request transport: xù en [ 198.053389] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 14:10:18 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000002500)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) socket$nl_xfrm(0x10, 0x3, 0x6) [ 198.080630] audit: type=1400 audit(1564927818.505:58): avc: denied { write } for pid=8110 comm="syz-executor.5" path="socket:[30868]" dev="sockfs" ino=30868 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 198.086630] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.125792] overlayfs: failed to resolve './fihH': -2 14:10:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:18 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) [ 198.151758] 9pnet: Could not find request transport: xù en [ 198.184835] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 198.304847] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.316060] audit: type=1800 audit(1564927818.545:59): pid=8116 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16713 res=0 [ 198.351341] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.370144] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.377624] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.384442] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.391345] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.398050] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.404796] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.411616] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.418286] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.425120] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.431865] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.438528] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.445256] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.451973] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.458637] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.465383] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.472087] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.478750] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.485730] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.492545] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.499214] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.505970] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.512684] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.519350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.526074] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.532772] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.543750] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.550500] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.557187] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.563946] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.570666] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.577328] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.584047] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.590742] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.597407] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.604490] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.611199] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.617864] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.624605] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.631305] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.637965] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.644689] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.651404] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.658064] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.664875] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.671570] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.678224] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.684955] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.691659] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.698334] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.705070] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.711771] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.719096] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.725822] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.732549] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.739408] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.746129] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.752823] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.759479] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.766197] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.777959] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.784742] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.791475] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.798141] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.804873] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.811599] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.818264] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.825029] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.831727] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.839000] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.845742] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.852439] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.859183] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.865942] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.872844] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.879507] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.886251] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.894179] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.900931] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.907604] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.914355] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.921082] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.927746] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.934481] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.941208] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.947891] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.954617] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.961324] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.967981] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.974691] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.981429] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.988095] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 198.994808] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.001536] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.008223] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.014952] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.021662] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.028412] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.035130] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.041856] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.048531] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.055239] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.061965] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.068632] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.075342] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.082060] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.088719] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.095444] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.102169] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.108833] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.115595] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.122305] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.128971] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.135807] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.142511] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.149164] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.155865] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.162572] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.169237] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.175953] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.182649] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.189307] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.196024] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.202729] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.209391] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.216100] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.222812] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.229478] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.236178] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.242883] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.249540] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.256241] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.262948] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.269611] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.276319] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.283025] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.289679] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.296380] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.303089] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.309769] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.316478] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.323181] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.329839] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.336557] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.343268] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.350069] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.356743] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.363466] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.370173] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.376843] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.383577] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.390302] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.396978] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.403718] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.410434] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.417111] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.423851] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.430565] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.437249] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.443987] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.450713] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.457386] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.464106] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.470803] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.477464] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.484177] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.490887] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.497554] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.504288] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.511306] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.518000] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.524763] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.531462] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.538209] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.544956] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.551686] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.558368] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.565138] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.571945] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.578616] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.585353] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.592144] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.598809] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 14:10:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000008b80)='/dev/null\x00', 0x12001, 0x0) sendmmsg$sock(r1, &(0x7f00000088c0)=[{{&(0x7f0000000040)=@sco={0x1f, {0x7048, 0x3, 0x6, 0x0, 0x9, 0x100000001}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000100)="993ce2772a113e5254f0a011e5cbe2dfbce7b245d30886815b138e0de8ac2728a080c467543dd34c3fde755454893431d03909d4b841b11d47197293afc3301c02fce24f3e6fb98dbddb9beb1dc1c52237accbf12918d10f006375973afc0a5a47a2c9620324943eaa1f73ea78ec3caf64c569e2", 0x74}, {&(0x7f0000000180)="8d8adf2ba09946d1d23e73ff08d7e46d660a8b34d7ce53e5fe5ca5d81db9abcc5bf82b142ffe765f9758a48295d834ecb398a706f940e7aa7128bf342bab618ea63db5cf1793430ad345f6368b3f823c4b0e944166a3f55c8fd646d610fcb86800602ddfd1751301e619e738e25a30877ec05389acec52cf6c57fa5e8f4a93f6f2a18f8341a6bbfe73bf686add9dfe479a2c6e9887954edee48cf9b315520c008a292be3e4ab67344cff82f2941b0f288b5c97fbe9a9ef2c7a0038", 0xbb}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="e67e812168e39fca7baec96b37799181d4bceb7275575e5f058e859bc3bbdd72d8b2f967b525a9503aebdd7e5d96f10b451bd248a7441e518eb5a2f68a86487c2f54bff91bbe5bcd97a6c3f62a7efc8e9a0dc5d4bf0f53688fe6b2815fe689c83e7eb92451a30354ea8af177bf7fbd9ab9661828206fb6f8ea739fd6b30da5af0771", 0x82}, {&(0x7f0000001300)="e859d85c63cf84de4c21ce9988125bfa566f64c994b1f16b3c8c68f0abdec9b57be4342d4a07f85048cca6b7db96aaf3bd83d8b7aec9565bf9ab7b2e813d4d55be3691f2c05e4df63ddbf7d502d3815acd4e43f555a8d6f3cbe9bfdf245c2f49294645ca36f2882d9042fea9", 0x6c}, {&(0x7f0000001380)="f939224906f6fbfc1948d0ea35a37f83f5683ca2aa825abc686ab1d2e62c840d16f8019863ea868f8d5e5e86e0cbf914dfcb05307bc375da903b09a81e2fb3b94d6ed828697c9905f8794bc2c812e7049277a62ac8257761a9c907307efdd2fb2a65ec5e30", 0x65}, {&(0x7f0000001400)="065e13efeebd59cc0816a482ffaf986b3c8a588d1bc0f2977e55132845ca627e63fb0559320371c4986417ae57b706ff8c3acc02de32a0cc544f569427d591211256c8041225e8e81d64b583815c9671dcacb0df7701ee0674f11a356559e442", 0x60}, {&(0x7f0000001480)="dc734daa0c6ebf3b79e5e49fe63227864cc271db62a3797bbcd78e6dac2fb5cd2da00fd11f746a2f0d4e45e7690a1735b7a10fa890f4c87c8637da931ed0eb282773245e234f36d6ff1418368c87de14a1f86e830f8532d038fd2a7211b4fd248efd4bd5c9a90d857ec897532d83e591e76f9fb044915ba585c9b25e0f429709e81b8954405e06b080684a0ac0d1a23e1eb70ea04e046bf4787075175b32bb4bedaeff1f3adec930680cfa26c5da97e0e7acda2fcf236676a911854b5b261afc303f1528a7bc28a54e132248bf1454064b75044b1909b6b5a664faae90", 0xdd}, {&(0x7f0000001580)="fb579e2cbc8aaf1cee3bebccbb9f0fe46312d8faa8f870cd446934def6576574ef5d302540a9774505bf57d1a4c17c1497438b75ca7b25b826ec84ba52f4d7d78ebd033c474afd52d720a7124bf8518367b6b36acc76e3cef9a1ff3752a6968025627fd85e0bd8fdaad13ed2e3679c91df0309cf51e1d30f8eaddd6e9186335a422336bcd8cdbcc4c2f95b78684f8ff4f991d1cd3097f7507ad4706e47f96ca5710bcbcff96dd7a06fbcbb3a8c9f8595b3f7ffef4e7a81", 0xb7}, {&(0x7f0000001640)="63462308a18c73c1369296b6400e9ffaca327fc6e48e321a320c3533e0619352938ab324381ec0b3a5ee0f9a2897f16d865fdb9730c31b5ff3ce751595500fcaad2841386017cf5e5d09dd90afe17ecbdb5b575a8e0435f9299a5621770d4da9c94bd21ab2fed3216ca402be9cf3cdf3019f1b81aff3", 0x76}], 0xa, &(0x7f0000001780)=[@timestamping={{0x14, 0x1, 0x25, 0xc8e}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x996}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}], 0x60}}, {{&(0x7f0000001800)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001880)="a2c155968c9e9c87302b674f55387013ff5776f72650854c4f260d6203b580915d4478052c", 0x25}], 0x1, &(0x7f0000001900)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffff9}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x48}}, {{&(0x7f0000001980)=@llc={0x1a, 0x17, 0x40, 0x1d6a, 0x0, 0x7fffffff, @random="5ed74a4fda0a"}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001a00)="55223f85518063cfadf0ce021d4384e2454517c986790cc96cdbe67dea728c7ef0fcb542b85f292aa6c00d99b5208d6063e9806a3fae60a4cc95a272a019dfa5b4342d7cc515b859d56df9e3777eceddfeab0d49852851f4e3378e13a57cb3341864791f51df1a48cf8e266afa9aabae513bc869344604533e5dc6357de032a5d8f685cc3c0bb3ad17e2ea89a6124b4be6ce59c5e439380a8b830b1b44bc3155ed1a5a40b38fcd65796d68358724686f874694f8fe70d084332fc8797347d3274c912fc4942bcdbad459420d72dbbc91a2789163c94338", 0xd7}, {&(0x7f0000001b00)="b779919b3d21f046e25da421994263b200f8a2837348722e672668bfa69ef60e810fdf5485c65813679cc0942f161d3341a609a7b013a6a7031294df2d413d3f76015d5f66bb9e1d13d48d49736742d52a7571e3035d4b2093ad9333349a98edba793f262b582f5d57570aaf6a1cde593527085310de9503afaecb7c8c1ca0f8769b6feb40046f95624e5824221b2663fd73a1d896e6404e975981e531ae", 0x9e}, {&(0x7f0000001bc0)="5e89bb4e509c60d5f10126b48ab21af4f6f8993f26744e0c1a1c4bd661d5591b4ba17570a854c35e09a662051365e3dd992079b55aef433cd14e003897b04c881a335a45d413890531ebcb64d2234eb0776c04f723f0f027ec641ffbf08f09f909e3b87671e1b0a72537da212bfd742b7853485b9bf181dc83ef1ece4b0b8954c14e391011e4fa5f938db815df0f0a0ed885d67ad64ba5628ea92298e497af91851f0fd45d29e4b9205e88517a05dff98381", 0xb2}, {&(0x7f0000001c80)="53fe6f5c4c299ada6fe9f4473207eb664e8ebb5ab232f2f074114de89d85a7e0b4f32041b5e2f9baf6e9d1fdd4112b6600d488002f2f4b390d6efb93def4cd854a875ee9c864ee8ff70ce0e7e62e5686e3f69050b9ab0fd86fe01d687e161cb1391dca14", 0x64}, {&(0x7f0000001d00)="8020558d9510d73ef45aa1cad22fd5a5abcfce3c92c96f536f53620de431f756e84af4f78316d4aecebf68638eb168490825d6b783b5df08960fdcf33977ef1ea330ea842e579fa9cf1a75bd64f717cc13d27a939f1b2e045c3f3b758b5f6fe4adae09907034859d49b64bc29013bd8348b873bedce6b6a8975879f25d045e3c490ed784821f59fec7687b69f7ba77dc6c3edabc0361dba076d5bb47836397017f19bd588b1ebe9c04ab355b147de66cfe8c70e296cba64f5e94b6b4241958d0e9fff6202c3c234bfff3", 0xca}], 0x5, &(0x7f0000001e80)=[@timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x8fb}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0x78}}, {{&(0x7f0000001f00)=@in={0x2, 0x4e24, @broadcast}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000001f80)="2483ee45a8c629595c8faa6f4c0f9174d5c30a7da9da567d95e820b6d3f80950964ebbf245a3456aac7e0974c205b6b1650854137c4c4767995bacbaef1c56c2e473e3171b8cd835403e032fa5f6e5cdf4602c7ad1bd24e17dc797c61d1e268fd9b0ce79a26cedc534158cd659209e451cee65824a918ca3b0eae9e08d8cf21d10904c543494418ef2362b8bbc215daadd2968316097bf4ff086177ceeb89067ce16b5", 0xa3}, {&(0x7f0000002040)="38e39fbcd74d82277ce07e5d84c2fff34435abd37a5a8d8687b94a324c317788e13130d0dbb73458f44a41dc2e37dff40dcea603b7f997a556ab39036ec991c67ebcb0ea79e24eb6c82445a531d776687206f1d307aa036a13baa814cd153c19596ab559b650db3062d1555676debab91311f7e2368a", 0x76}, {&(0x7f00000020c0)="d22ab8bdc47493ab5352a71487b6a7800a7fc69af5ffb49fd948a14c8fbf4a639f79caf7e30b892c2f4dc7b2339de6", 0x2f}, {&(0x7f0000002100)="9082bb86fba941b4575ab569c2c1f96d552bac9b264ab9f155058c20bfe9f8bfaf55794871a8808fa468fc2abb2d827713444dcd3e880fb98498b79ff6f081ce79da557a0b4cc444d13fc19b99149721cd480b614b1ceda79030e7966475f45fe5e3c93ae70ad7ffcec0338cbe9c083fed4132710883b4693171c311", 0x7c}, {&(0x7f0000002180)="cd07b694eaeb47bd17e779730fad4a524e9f197746b7788f", 0x18}, {&(0x7f00000021c0)='~', 0x1}, {&(0x7f0000002200)="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", 0x1000}, {&(0x7f0000003200)="77f8891ecd2712b1c5757454f82ed400e1f7f5711be42c29e1b5ac7dabee0c3127aa38bd3c2aae8289445d6fd1146ffb6a2692eb9db4b480153b6933d33b5c5e992b47d91ce6ad99a66b42c1d96ef9893705e795c550242abd1469c16fce155e46703f14f3592e433e0ae6f7d86011bcff59ef1a675f8bb46bd20228927fe3de1dbf7b47b1225a54348f7b36", 0x8c}], 0x8, &(0x7f0000003340)=[@mark={{0x14, 0x1, 0x24, 0x65e5}}, @txtime={{0x18, 0x1, 0x3d, 0xdcde}}], 0x30}}, {{&(0x7f0000003380)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x80, &(0x7f0000004880)=[{&(0x7f0000003400)="a11eef3fa5", 0x5}, {&(0x7f0000003440)="90aa02f0684f3c88e5863930061c9ebba5197544dd58f73e9bbc92f50a8e7c6c4bdef19dd5c509c29c9955577bba8e725aaa536b43ee0b165c1b292a89221b8291a62784f8d12483ba83af2f6c77cf", 0x4f}, {&(0x7f00000034c0)="d2d5bcb9c30618746b314690a3b95d8db3b2c62590569837d836ac5e071b3d2bddd533c807a7795767a42196350b82149b71da42a8a83037ee5fa352c5a1efa47315d9711dc3a756d50bf632cf6b19f51d63ddcd61d4f0e30340ff0fc07ba3b5a3bf7b96743c0026ce", 0x69}, {&(0x7f0000003540)="15f99a4ffb56e2008f5a595ffb2d19f20ebd87f798bb600fa773c17cef6df421a8f823e3d9404ea85e34729112705bca9f16ae2a195dc2cf8658ac5ffe85c9b341b1441780cb7d99a602b60de59ced2c6685f41ebfb38e8e96b70ffd809f488048c694065e717d2d563570f7d167441fc69fb77afbda3d89a456357e98292ce5a60021", 0x83}, {&(0x7f0000003600)="a8d361bbf3df8b5f4b38979a454660c5e862a832779d7a5ccc0969ee3c539d459bd5d2cfc94a164f70766454064d176ceed0f4c06b5bacc115d333ee413e4d1e478346691acd87aaacda4b1b3ed78247fa7c342df32c873ebee0867e308b246f1fd4dea69210e34c0380509d922ba6e3d951225a02c5e4e538f581db60d0de847527141f2b0d58f6089a40522349d2849a4070606ec95a6553acdeab713c77adf6c9427bae1edb88983bfbc4dfd17c7fab916a38", 0xb4}, {&(0x7f00000036c0)="4a76425f6467d354d7712b91f526c1be44f609c7350b735abfd663", 0x1b}, {&(0x7f0000003700)="c8cae4f5dc47cee580d32a8690b72837f2db9d5ec4c8f9e9ee5b9201f9631b78b8438815b900c297d760e5b16249a550bbce20cafa292d2c1d8d9e3dfcd803d9e31f3097948828454736c91525ea8db9b0cd80796ac50f07b2987b9d93136d8b5b40", 0x62}, {&(0x7f0000003780)="e3b032f8eaec31f892915ac1b2287ba3458e9894a9900d539aa28443f710cdc85cdcc2655c7b191effeeb1a35cf3b68dade4e80360e029e2dbf61bfd4229dca73aae2b45de6d0869a7bb91dafb90444011bf073da5114c7ccf8e7793b1798c3ea6c266bfbbacc743e8a0985d29feb8194dcd4fe552511e148de9d18329d2bb68a714b9fc35594d0d655b1ca7ac1b5936be03190a93d06de668911cf51f20c70b02628406ca3dc065bdeadd5ef5e3d7049acfc57d3c333a2d0478a5265fd0bf06bcebdcc32fa93a602dd5ac8b299e52b5d0aeecb13423b537baf5054e4198d30cab6d45ade80a38e3ff8f11be", 0xec}, {&(0x7f0000003880)="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", 0x1000}], 0x9, &(0x7f0000004940)=[@mark={{0x14, 0x1, 0x24, 0xb45}}, @txtime={{0x18, 0x1, 0x3d, 0x3914}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}, {{&(0x7f00000049c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000004a40)="99cf3532b190efeb0b24c2c60f2e8552fb7b75a24063a0dc6dd9429757a6afc742a26e15b2d561a77e89d1698079d50c271266d7ecaf40ed2f5d386c8c368de143a30accbc0c562d4812ff3b404747497a74658d3e92c4db6b150969eb7377a6ecae455a573e", 0x66}, {&(0x7f0000004ac0)="59bafd5ccbdd7e15a9f2d61ad8f8a3313387753e20d08073262db408b675e7a7247949dce3fed17c479b96246c49368e30d201546c97d50a24e5dd7b6fb8b824c83b82248dff746ca2f8fc6f2a6967b111420414342508bc927bbe1aa3b37f08e1bf5a8e0fc303cc4817d11649b73d37c2900699aca16a8a2582e7bd6e8b3dd7a8ae5959f1ba0b5b12ea72afd13fef254f1c4b2afb7cadbd2bc72be70ac5206eacf0be4bd153ace76a2f7a108ec713909ede0cc3a2fa59e50f544c6cbab3b1d85c0f510bc664ee89", 0xc8}, {&(0x7f0000004bc0)="5919094b7af841d9d1488076f8dcdee3b3cd41b877dd5fa66c0e5ae6354064968f0aff02da5805125d36da16692713234a667462d8074359a02bec06475c5cb4b50ff74dfbd4e1592ce5d989fead215ba0bfa60cb39e474484e7797f19e48f604d54ad031070c9ed8058ad1b89ccacc8c6a675448f57d892b2f067e4fc8bd150c696bc6b2c4a6ff561c6ed7ea38788325395a3f97ffd30108d7b07516a3be55b1d2b28f21b94a93372a6cc3a3d2e9048e36bd3dbb62b5b0cbba82326259ef7cb57731d52", 0xc4}, {&(0x7f0000004cc0)="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", 0x1000}, {&(0x7f0000005cc0)="142dc6280518aae2129b9b2f65e80c907530468b24b740d8d6e3103b6c49", 0x1e}], 0x5}}, {{&(0x7f0000005d80)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000005e40)=[{&(0x7f0000005e00)="8b1c015a72d3dfc47e1dfe5e16cc3dc3e04614bc1e1565ff62", 0x19}], 0x1, &(0x7f0000005e80)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7bd}}], 0x78}}, {{0x0, 0x0, &(0x7f0000007400)=[{&(0x7f0000005f00)="842f53d39d80d786d7d260964ee58cf6d12afc834b7b8baa97e6b9e04c59c56bf094f52003af2e58a133e27bd77c3886c051e3f6c9ecb0f34a8c57c68cce5c8458159bf830a8573e895485304e77800adc6b45b447a5353eb43ff7c4cd88d6adbcd063999e3c3ba0fa5c77d6c9c46c28218af4a6b7300f6ad9dfd54289a4b0d85dd871a8418886bb7482511ed8d2343c4502d12489c6f19b98f572aab41afbe63a7c215bbad48596d379b7", 0xab}, {&(0x7f0000005fc0)="519071821ab0551ddf4878ec8a549ee9793b3a1725dcc90450bbaa39daea26ec3a070bfa3a41fc8b25a63d7e3716c5139a9c2c4d05ecea1d506533df98960426343b4f904a3d9e2469aa922eb1183ac481dbe358cf03a724617edd19db7d1c8686f2c39cfb3cf662342081c815883f030d59e4ffeefb9aa3cecd8bd1375c7140b0d564312d3fb27c8bfac31d88ba78dd81", 0x91}, {&(0x7f0000006080)="78af859a9b6cb8db81c27a53433a7bfb9095933381ac35895a6a7e98309b77766f988dcd190ff6e35ad3a0357f7f2303acbe6f01d021c19405efea9a47caddc53978ae707ebcdfca9da6bc6e330cec8f826b2f1638e851c1b2bce2254caed34e851abc680604f72b31d5b3e4603b9ea314e8065858501595914d6a07ae537e3538f5ab2ceae9b4acaa5b2623de6a3e48000f9316edb68b7447a3", 0x9a}, {&(0x7f0000006140)="6f740e02f134e6c62ad0986b1e38830e5904de3f171d2dc26f7a61a5c19c1dd1174eea2c7aa28730fa20c3743d3cf2045ab2c7680b6ff164b1e408b3543a7ccda80b4fb9fd96683614e4ffe514e655d04a1cc54503b7b8b834cdee48cb49d2d5d9905f579d6cbc5845445e6a83328ca16dc2771157dfdb94139fd5442e45deffc869cecf2d166aba597f9520a9500a8e02c673faba131977b1f6afc3a72c66a16f131823af6d9d597254a310dc6c2320081bc1bb03655f64c9483790297418f28b228887b3138655c13cd7f10133633029191802cdc0f2a6ba43eff0ff5d8a921d0b023db32441f853ac8d6c5a12", 0xee}, {&(0x7f0000006240)="dd73dcef26ba97c3c889ee33ffd7fb3b43aff041971ad26138dd9320764722347245328cb726815e1f42432039346a48d5263afaeba2c495e832d25b53edad4299689b829881cfa9e6aa181326b62e3e71d8a43210bfac0feabef2da407483d9a34690b689bc0f74921c16ab2881f1fc9822b13020081eec1466854cf27e0e256adb9df5c1d667ea73f676a547b46885c6927bb97c4159712d7b5360b4cbd1c264650bc6904b8b3b21941e5fad5d647301b46f945de2e603822d0c35e7dc3c05a04157d52cf9981c8fdd5e88b9eee0ec", 0xd0}, {&(0x7f0000006340)="419e01cb1ca4c9f90a7db8536e87b21d1be795338a4b9742709a64fea79f89b0909ada019d9d9ec29034dc09b520b7c0acb5f463bae7b17d57f45aa10d9517ec8a60a476778d662faba133e4e7cbc61b2058d0022423eb997545c2f6f582f760eff4be2a788a5117f6059a6f08ecea0e", 0x70}, {&(0x7f00000063c0)="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", 0x1000}, {&(0x7f00000073c0)="b4eb3a3baa1dfe9da55496cd4e7583b89ecacd4d06c4acee2b80fe838c84d41a4054", 0x22}], 0x8, &(0x7f0000007480)=[@timestamping={{0x14, 0x1, 0x25, 0x7f}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}], 0x30}}, {{&(0x7f00000074c0)=@rc={0x1f, {0x1400, 0x3, 0x3, 0x6, 0x8001, 0x2}, 0x6}, 0x80, &(0x7f0000008800)=[{&(0x7f0000007540)="93fd0e16cf9337ebe8542a0388b815d87aea4778e9f7ff76a62f66a5c4d9da3abf8ec442d1404be14c729e1d1ff65517082cf9261ce72c266e262bf051a614aa4afe048e9d98", 0x46}, {&(0x7f00000075c0)="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", 0x1000}, {&(0x7f00000085c0)="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", 0xfd}, {&(0x7f00000086c0)="feae6f55899257734f298be9601c8128a5efde8f8847469a051ab9b95a0ec6b30e2b7ea8e04b7cadbc75c3b12812f4677576d137c68c", 0x36}, {&(0x7f0000008700)="a29575f6b8bc34f2272ff49a605272aac7f38aa355de81326787a8b67758253af41b55d0bc18b8d54743a1a550c104e1b79e1f68bab45c05a36d6c9003696da058040ec5bce0a0ec6a89466477ecf8c94586bb797de22042dca5e17a267b7251807de61d45a9e41ca29578a05762d3de131c5a8a2af597340f2e1eb48f6b0ac91787aedd860c20e683dcb9d83090e408cd5a36c40a7a4e58e973ad13e18c016f137e872995a8a95f86a2af4e1b058c1bc641026206b06ea95d43ec2f0856f2155aa5180185e20f83a9af6dacea3029a3ffa8b048a5bc9bfb67f82da458e9b4c41f44", 0xe2}], 0x5, &(0x7f0000008880)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x81}}], 0x30}}], 0x9, 0x4) madvise(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x80000000066) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 14:10:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:20 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000002500)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) socket$nl_xfrm(0x10, 0x3, 0x6) 14:10:20 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 14:10:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x7fff, 0x0, 0xff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x2000000) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000380), &(0x7f0000000140)=0x68) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4242, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0xffffffffffff33ef, 0xbe4, 0x301f, 0x4, 0xe, 0x3, 0x2, 0x7}}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa48204) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4002, 0x0) r5 = openat(r4, &(0x7f00000002c0)='./bus\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000300)=0x3, 0x2) ioctl$VIDIOC_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) ioctl$VHOST_GET_VRING_BASE(r4, 0xc008af12, &(0x7f0000000340)) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) [ 199.605539] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 199.613326] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz0] on syz0 14:10:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:20 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) [ 199.669938] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 199.695535] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 199.712283] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 199.728626] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 199.746327] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 199.754902] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) write$binfmt_script(r1, 0x0, 0x0) 14:10:20 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0x5, 0x3, 0xffff, 0x7, 'syz1\x00', 0x4}, 0x0, [0xffff, 0x3, 0x5, 0xfffffffffffffff7, 0x5, 0x1e, 0xfffffffffffffff8, 0xfb, 0x100000001, 0x9, 0x9, 0xfe1, 0x8, 0xffffffff, 0xdcbc, 0x7ff, 0xffffffff, 0x49, 0x0, 0xfffffffffffffffb, 0x6, 0x0, 0x401, 0x5, 0x3, 0x0, 0x0, 0x2, 0x74ae, 0xea99, 0x1, 0x2be8ba19, 0x30d, 0x14, 0x1, 0x25a1, 0x1, 0x796, 0x4, 0xc0000, 0x7, 0x8, 0x1, 0x9, 0x6, 0x8, 0x7, 0x4, 0x9, 0x9, 0x5, 0x0, 0x0, 0x101, 0x1, 0x8, 0x0, 0x9, 0xff, 0x1ff, 0x5, 0x7, 0x8, 0x3, 0x3, 0x4, 0x100, 0x20, 0x63a83080, 0x5, 0x6, 0x6, 0x1, 0x5, 0x0, 0x180000000, 0x9, 0x1, 0x5, 0x401, 0x5, 0x10000, 0x1f, 0x0, 0xff, 0x0, 0x8, 0x400, 0x8000, 0x10000000000000, 0x5, 0x7fffffff, 0x98, 0x0, 0x78b, 0x800, 0xe503, 0x80000001, 0x482a816d, 0xfb75, 0x4, 0x3, 0xfffffffffffffffe, 0x3, 0xaa8, 0x2, 0xff, 0x40, 0x1, 0x1, 0x100000000, 0x4, 0x4, 0xf6, 0x2, 0x5, 0x9, 0x80000001, 0xfff, 0x9, 0xffffffff, 0x9, 0x9, 0x2, 0xffffffffffffff6c, 0x9, 0x9, 0xf71c], {r2, r3+30000000}}) setreuid(r0, 0x0) setrlimit(0xc, &(0x7f00000006c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000040)={0x116, 0x9, 0xfffffffffffffffe, 0x300}) bind$netrom(r4, &(0x7f0000000640)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}, 0x48) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000700)={0x40, 0x1, 0x1, 0x7, &(0x7f0000000000)=[{}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 199.777261] audit: type=1800 audit(1564927820.365:60): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16708 res=0 [ 199.778084] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 14:10:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:20 executing program 3 (fault-call:3 fault-nth:0): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 199.943515] FAULT_INJECTION: forcing a failure. [ 199.943515] name failslab, interval 1, probability 0, space 0, times 1 [ 199.974073] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.003833] CPU: 0 PID: 8189 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 200.010908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.020272] Call Trace: [ 200.022873] dump_stack+0x138/0x19c [ 200.026519] should_fail.cold+0x10f/0x159 [ 200.030693] should_failslab+0xdb/0x130 [ 200.034690] __kmalloc_track_caller+0x2ec/0x790 [ 200.039402] ? __sb_end_write+0xc1/0x100 [ 200.043475] ? strndup_user+0x62/0xf0 [ 200.047284] memdup_user+0x26/0xa0 [ 200.050831] strndup_user+0x62/0xf0 [ 200.054459] SyS_mount+0x3c/0x120 [ 200.057904] ? copy_mnt_ns+0x8c0/0x8c0 [ 200.061809] do_syscall_64+0x1e8/0x640 [ 200.065719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.070575] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.075777] RIP: 0033:0x459829 [ 200.078978] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 200.086709] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 200.094068] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 200.101345] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 200.108602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 200.115877] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 [ 200.131853] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.153192] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.159937] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.168767] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.177611] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.185700] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.193684] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.200446] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.207124] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.213895] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.220615] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.227297] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.234036] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.240778] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.247453] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.254215] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.260962] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.267632] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.274398] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.281115] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.287784] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.294510] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.301222] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.307882] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.314620] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.321353] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.328018] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.334759] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.341509] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.348176] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.354929] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.361650] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.368319] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.375034] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.381759] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.388437] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.395151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.401864] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.408530] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.415264] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.422003] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.428668] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.435376] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.442085] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.448752] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.455464] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.462188] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.468872] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.475628] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.482347] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.489032] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.495754] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.502474] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.509139] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.515982] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.522702] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.529377] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.536085] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.542809] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.549475] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.556232] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.562953] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.569621] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.576341] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.583087] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.589762] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.596474] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.603211] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.609879] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.616610] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.623332] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.630078] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.636815] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.643594] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.650304] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.656974] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.663713] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.670442] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.677134] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.683862] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.690581] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.697258] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.703986] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.710686] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.717369] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.725098] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.731825] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.738524] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.745270] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.751980] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.758642] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.765377] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.772102] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.778773] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.785500] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.792878] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.799589] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.806387] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.813120] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.819786] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.826640] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.833449] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.840249] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.846932] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.853647] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.860379] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.867051] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.873801] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.880516] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.887185] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.893910] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.900651] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.907350] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.914064] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.920816] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.927480] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.934193] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.940922] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.947587] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.954303] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.961012] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.967681] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.974420] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.981141] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.987800] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 200.994504] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.001203] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.007868] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.014583] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.021295] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.027980] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.034795] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.041498] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.048156] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.054870] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.061598] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.068896] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.075629] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.082349] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.089018] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.095729] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.102430] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.109089] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.115843] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.122550] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.129305] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.136016] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.142725] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.149381] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.156085] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.162789] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.169466] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.176174] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.182907] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.189603] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.196338] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.203066] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.209733] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.216460] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.223271] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.229947] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.236658] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.243364] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.250065] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.256735] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.263461] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.270156] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.276818] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.283538] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.290237] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.296914] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.303630] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.310331] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.316996] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.323713] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.330401] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.337056] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.343783] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.350470] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 14:10:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x400002, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00012dbd7000fcdbdf25100000000800050007000000a1e068b8add1ecb036d3ca9ea863d81408b23a252d045663b62027c6655c8f30b3c367fb599f00a57535aff59ed5876dc036388bf3c7db84c9277a19d1e9b7b03e56c16558f6ee80b7d270eedf00"/125], 0x1c}}, 0x1) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x5}, 0x2c) r4 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:10:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x244001, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000001c0)=0x1000000) utime(0x0, &(0x7f0000000040)={0x0, 0x2}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x101000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00'}) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e22, 0x4, @loopback, 0x7}, {0xa, 0x4e22, 0x0, @local, 0x6}, 0x80, [0xa900, 0xd6, 0x6, 0x9, 0xc93, 0x0, 0x6, 0xd5]}, 0x5c) write$P9_RSYMLINK(r1, &(0x7f00000002c0)={0x14, 0x11, 0x1, {0x20, 0x3, 0x7}}, 0x14) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000000)) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) 14:10:22 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0xfffffffffffffffd) 14:10:22 executing program 3 (fault-call:3 fault-nth:1): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 201.357128] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.363855] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.370562] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.377225] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.383934] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 201.391748] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz0 14:10:22 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) prctl$PR_GET_FP_MODE(0x2e) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x10) r1 = add_key$user(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000340)="a154c0c8", 0x4, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x4001, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x3ffffc) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000002004e4dd07feae0c159556728c988437e8bdc920dd8364337c3abe2d1267be337b515b91ff174aa8193a925d855ef9d6ac3c0b8ba8e916d68a723c98800000000"]) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000500), 0x3e) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r3, 0x0, 0xffffffffffffff4c, 0x20000005, &(0x7f0000000400)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = semget(0x1, 0x3, 0x10) semctl$IPC_STAT(r5, 0x0, 0x2, &(0x7f0000000580)=""/227) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5}, 0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000540)={0x40, 0x10001, 0x8, @remote, 'eql\x00'}) prctl$PR_SVE_GET_VL(0x33, 0x1c95) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x7ff, 0x8000, 0x6, 0x9, 0x1}, &(0x7f0000000080)=0x98) sendto$inet6(r2, &(0x7f00000003c0)="b031996d11dc3b40975a5f57b527d27567639f7a47e88fb4f52b5f81be7973cc34baef6a89e449d99da702ab715542c00b891dc61f", 0x35, 0x41, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={r6, 0x612c}, &(0x7f0000000240)=0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x7fff) sendfile(r4, r7, 0x0, 0x8040fffffffd) 14:10:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x4880) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, &(0x7f0000000140)="4c302cd12452f3a5f67ce96b8ba4dd8a6fb782f9d49a423bc89982aeb1de62bab648171e60c255a6e2b55f984990ce4649d336af588afa54802ff77ccdcce7139426ee0b6bde2ba9d41482c489779125a240444ace7bf2e8bcd41a05bf2e3a301e7522068972ce68cf627210711fcc37977d7fcef837cb6844147751883b1a6c04db3be8781740295469bb77bb81cc5dbb71065292ecfbf74cdea678652efcf8f4dddcbbbaa30819d3a142a91b8367ed8b147a93d68a39b297a30f78ba413852d0dde8a8a7543adc", &(0x7f0000000040)=""/159}, 0x18) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) shutdown(r0, 0x0) [ 201.455691] FAULT_INJECTION: forcing a failure. [ 201.455691] name failslab, interval 1, probability 0, space 0, times 0 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 201.502027] XFS (loop2): unknown mount option [subj_type=syz0]. [ 201.525859] CPU: 1 PID: 8205 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 201.532923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.542288] Call Trace: [ 201.544908] dump_stack+0x138/0x19c [ 201.548568] should_fail.cold+0x10f/0x159 [ 201.553926] should_failslab+0xdb/0x130 [ 201.557915] kmem_cache_alloc_trace+0x2e9/0x790 [ 201.562591] ? kasan_check_write+0x14/0x20 [ 201.566833] ? _copy_from_user+0x99/0x110 [ 201.570991] copy_mount_options+0x5c/0x2f0 [ 201.575233] SyS_mount+0x87/0x120 [ 201.578860] ? copy_mnt_ns+0x8c0/0x8c0 [ 201.582763] do_syscall_64+0x1e8/0x640 [ 201.586659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.591523] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.596705] RIP: 0033:0x459829 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x7}, 0x156) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) sync_file_range(r0, 0x0, 0x0, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) fallocate(r1, 0x0, 0x0, 0x2000002) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xc4d6, 0x7fffffff, 0x9, 0x16, 0x7}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x101, 0xffffffffffffaa20}, &(0x7f00000002c0)=0x8) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) dup2(0xffffffffffffffff, r0) [ 201.596714] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 201.607599] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 201.607604] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 201.607608] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 201.607613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 201.607617] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_UNALIGN(0x6, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffc0}, 0x48) 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) getsockname$tipc(r0, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) getgroups(0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="030000000367c9"], 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 201.795965] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:22 executing program 3 (fault-call:3 fault-nth:2): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1f, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 201.977306] XFS (loop2): unknown mount option [subj_type=syz0]. [ 202.038180] FAULT_INJECTION: forcing a failure. [ 202.038180] name failslab, interval 1, probability 0, space 0, times 0 [ 202.062888] CPU: 1 PID: 8264 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 202.069946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.079298] Call Trace: [ 202.081874] dump_stack+0x138/0x19c [ 202.085489] should_fail.cold+0x10f/0x159 [ 202.089624] should_failslab+0xdb/0x130 [ 202.093586] kmem_cache_alloc+0x2d7/0x780 [ 202.097723] ? fs_reclaim_acquire+0x20/0x20 [ 202.102028] ? find_held_lock+0x35/0x130 [ 202.106072] getname_flags+0xcb/0x580 [ 202.109863] user_path_at_empty+0x2f/0x50 [ 202.113995] do_mount+0x12b/0x27d0 [ 202.117518] ? copy_mount_options+0x5c/0x2f0 [ 202.121921] ? rcu_read_lock_sched_held+0x110/0x130 [ 202.126918] ? copy_mount_string+0x40/0x40 [ 202.131138] ? _copy_from_user+0x99/0x110 [ 202.135270] ? copy_mount_options+0x1fe/0x2f0 [ 202.139748] SyS_mount+0xab/0x120 [ 202.143181] ? copy_mnt_ns+0x8c0/0x8c0 [ 202.147050] do_syscall_64+0x1e8/0x640 [ 202.150916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.155745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.160913] RIP: 0033:0x459829 [ 202.164081] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.171772] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 202.179030] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 202.186280] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 202.193528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 202.200778] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:22 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000000c0)={0x7, 0x0, 0x0, {0x7fffffff, 0x1, 0x6, 0xfcb}}) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=@framed={{0x1d, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 14:10:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x40, 0x4) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 202.404757] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x7}, 0x156) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) sync_file_range(r0, 0x0, 0x0, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) fallocate(r1, 0x0, 0x0, 0x2000002) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xc4d6, 0x7fffffff, 0x9, 0x16, 0x7}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x101, 0xffffffffffffaa20}, &(0x7f00000002c0)=0x8) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) dup2(0xffffffffffffffff, r0) 14:10:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:23 executing program 5: capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, r0, 0x5) mkdir(&(0x7f0000000180)='./file1\x00', 0xffffffbffffffffe) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 14:10:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000000000, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:23 executing program 3 (fault-call:3 fault-nth:3): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 202.616438] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:23 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x101000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0xfffffe93, 0x3) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x8001) getpid() geteuid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in6=@empty}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) r5 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in6=@dev}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@remote}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0xe8) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000d40)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getegid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresuid(&(0x7f00000011c0), &(0x7f0000000140), &(0x7f0000001240)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x7, 0x2, 0x1ff, 0xffffffff, 0x3, r5}) 14:10:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) getsockname$tipc(r0, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) getgroups(0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="030000000367c9"], 0x7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 14:10:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x64}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 202.756158] FAULT_INJECTION: forcing a failure. [ 202.756158] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 202.768007] CPU: 1 PID: 8307 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 202.775014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.784358] Call Trace: [ 202.786953] dump_stack+0x138/0x19c [ 202.790746] should_fail.cold+0x10f/0x159 [ 202.794885] __alloc_pages_nodemask+0x1d6/0x7a0 [ 202.799646] ? fs_reclaim_acquire+0x20/0x20 [ 202.803951] ? __alloc_pages_slowpath+0x2930/0x2930 [ 202.808956] cache_grow_begin+0x80/0x400 [ 202.813003] kmem_cache_alloc+0x6a6/0x780 [ 202.817154] ? fs_reclaim_acquire+0x20/0x20 [ 202.821480] getname_flags+0xcb/0x580 [ 202.825263] user_path_at_empty+0x2f/0x50 [ 202.829396] do_mount+0x12b/0x27d0 [ 202.832941] ? copy_mount_options+0x5c/0x2f0 [ 202.837331] ? rcu_read_lock_sched_held+0x110/0x130 [ 202.842330] ? copy_mount_string+0x40/0x40 [ 202.846553] ? _copy_from_user+0x99/0x110 [ 202.850686] ? copy_mount_options+0x1fe/0x2f0 [ 202.855162] SyS_mount+0xab/0x120 [ 202.858599] ? copy_mnt_ns+0x8c0/0x8c0 [ 202.862472] do_syscall_64+0x1e8/0x640 [ 202.866361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.871204] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.876384] RIP: 0033:0x459829 [ 202.879555] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.887349] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 202.894599] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 14:10:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 202.901851] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 202.909104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 202.916353] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 [ 202.942398] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 203.095873] XFS (loop2): unknown mount option [subj_type=syz0]. [ 203.296374] tmpfs: No value for mount option ' 3333ff00001a [ 203.296374] 36 team_slave_1 1 0 3333ffaaaa1a [ 203.296374] 36 team_slave_1 1 0 3333ffaff80e [ 203.296374] 25 veth0_to_bridge 1 0 333300000001 [ 203.296374] 25 veth0_to_bridge 1 0 3333ff00001b [ 203.296374] 25 veth0_to_bridge 1 0 01005e000001 [ 203.296374] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 203.296374] 26 bridge_slave_0 1 0 333300000001 [ 203.296374] 26 bridge_slave_0 1 0 01005e000001 14:10:24 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) move_pages(0x0, 0x3, &(0x7f0000000140)=[&(0x7f0000002000/0x2000)=nil, &(0x7f0000008000/0x1000)=nil], &(0x7f0000000040)=[0x0, 0x1], &(0x7f0000000180), 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) r3 = accept4$netrom(r2, 0x0, &(0x7f00000000c0), 0x19d500258c0d68fe) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000080)={0x8, 0x3, 0x7, 0x20, 0x14639abf}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syzkaller0\x00', r4}) 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 203.296374] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 203.296374] 33 veth0_to_team 1 0 333300000001 [ 203.296374] 33 veth0_to_team 1 0 01005e000001 [ 203.296374] 33 veth0_to_team 1 0 3333ff00001f [ 203.296374] 33 veth0_to_team 1 0 3333ffaaaa1f [ 203.296374] 27 veth1_to_bridge 1 0 333300000001 [ 203.296374] 27 veth1_to_bridge 1 0 01005e000001 14:10:24 executing program 3 (fault-call:3 fault-nth:4): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 203.462927] XFS (loop2): unknown mount option [subj_type=syz0]. [ 203.541814] FAULT_INJECTION: forcing a failure. [ 203.541814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.555234] CPU: 0 PID: 8340 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 203.562256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.571619] Call Trace: [ 203.574211] dump_stack+0x138/0x19c [ 203.577842] should_fail.cold+0x10f/0x159 [ 203.582004] __alloc_pages_nodemask+0x1d6/0x7a0 [ 203.586681] ? fs_reclaim_acquire+0x20/0x20 [ 203.591018] ? __alloc_pages_slowpath+0x2930/0x2930 [ 203.596057] cache_grow_begin+0x80/0x400 [ 203.600135] kmem_cache_alloc+0x6a6/0x780 [ 203.604287] ? cache_grow_end.part.0+0x92/0x160 [ 203.608968] getname_flags+0xcb/0x580 [ 203.612775] ? lock_downgrade+0x6e0/0x6e0 [ 203.616926] user_path_at_empty+0x2f/0x50 [ 203.621074] do_mount+0x12b/0x27d0 [ 203.624620] ? copy_mount_options+0x5c/0x2f0 [ 203.629027] ? rcu_read_lock_sched_held+0x110/0x130 [ 203.634046] ? copy_mount_string+0x40/0x40 [ 203.638281] ? copy_mount_options+0x1fe/0x2f0 [ 203.642780] SyS_mount+0xab/0x120 [ 203.646227] ? copy_mnt_ns+0x8c0/0x8c0 [ 203.650115] do_syscall_64+0x1e8/0x640 [ 203.654002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.658853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.664036] RIP: 0033:0x459829 [ 203.667223] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 203.674930] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 203.682203] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 14:10:24 executing program 4: socketpair(0x11, 0x75f2c00946892cb6, 0x1, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/checkreqprot\x00', 0x440400, 0x0) pwritev(r1, 0x0, 0x106, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/rtc0\x00', 0x80080, 0x0) ioctl(r6, 0x5, &(0x7f0000000c00)="e4980515748ff7f51170397f87b4fc5d1cfec2") fchdir(r5) poll(&(0x7f0000000440)=[{r3}, {r2, 0x4422}, {r4, 0x14}, {r4, 0x1000}], 0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000b80)=""/26) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) preadv(r4, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/200, 0xc8}, {&(0x7f0000000600)=""/46, 0x2e}, {&(0x7f00000006c0)=""/152, 0x98}, {&(0x7f0000000780)=""/42, 0x2a}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/236, 0xec}, {0x0}, {&(0x7f00000009c0)=""/184, 0xb8}], 0x8, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x4) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3f", 0x69, 0xfffffffffffffffb) r7 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r7, 0x4018aee1, &(0x7f0000000200)={0x0, 0x5, 0xffffffff00000000, &(0x7f00000001c0)=0x10001}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0bc5351, &(0x7f0000000280)={0x7, 0x0, 'client1\x00', 0x3, "aa910a574ad66d45", "4da870ba178e36359c1c9894568fcb5192b3a8824926d79d2a30929543ba324c", 0x4, 0x3}) syz_emit_ethernet(0x7a, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r8 = fcntl$getown(r0, 0x9) syz_open_procfs(r8, &(0x7f00000003c0)='fdinfo\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:24 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x101000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0xfffffe93, 0x3) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x8001) getpid() geteuid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in6=@empty}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) r5 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in6=@dev}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@remote}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0xe8) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000d40)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getegid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresuid(&(0x7f00000011c0), &(0x7f0000000140), &(0x7f0000001240)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x7, 0x2, 0x1ff, 0xffffffff, 0x3, r5}) 14:10:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 203.689477] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 203.696749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 203.704106] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:24 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffc000/0x2000)=nil) r1 = socket$key(0xf, 0x3, 0x2) symlink(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) chroot(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000080)={0x1, 0x8d66, [{0x800, 0x0, 0x3}]}) connect(r1, &(0x7f0000000140)=@x25={0x9, @remote={[], 0x0}}, 0x80) dup2(r2, r1) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000240)="11dca5055e702f073dc03e08b79e38cbfaccabd80f93726d41ed8e6d76c2baca0c8b31ae1a507b3082517f4a7e7e8a71e4fc66a863441fe54b5fd08409c994829d6c933c4cf04b0a9dc852e907d9d56b79f8bbfdde98e441ffb79cbafc85b449811e8c36ba3daf6b01ce6246f00774199d9affe50ffa35eab7a55b3a8551944d9079188bc1feb78c778dc6bc36d662d1d83b51ca1be8a11dc64dbc7f5b03bc7a7cc8e28fca8fe633dba381984af6b612574bb57de5f76b9f6ab5935b432073c42d667081") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000200)='y\x00', 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x200000000000000) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@can, 0x0) shmat(r0, &(0x7f0000ff9000/0x7000)=nil, 0x5000) keyctl$update(0x2, 0x0, 0x0, 0x1afe075f16114a62) 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 203.824687] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:24 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x101000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0xfffffe93, 0x3) read(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x8001) getpid() geteuid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in6=@empty}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) r5 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in6=@dev}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@remote}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0xe8) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000d40)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getegid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresuid(&(0x7f00000011c0), &(0x7f0000000140), &(0x7f0000001240)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000000c0)={[], 0x7, 0x2, 0x1ff, 0xffffffff, 0x3, r5}) 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:24 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000600)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="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", 0xf80, 0xfffffffffffffff8) r0 = add_key(&(0x7f0000001680)='logon\x00', &(0x7f00000016c0)={'syz', 0x1}, &(0x7f0000001700)="2bcd700db6d1c0aa3a86e2a0c82e799b535e339f9d8685256c612483d0b1693bf620382a6e3332696c0d76097c2aa8db5a3672697a771280c5114eaaeacfb7df25214803792db32c92faf4b2c54da0d40ca002c1c9afae1719a30b1a175f4ee9822d46a2a4cbed9116a927648d40d80480f5ba", 0x73, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x39a, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) eventfd2(0xffffffffffffffbd, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = getuid() setfsuid(r3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000200)=0x5, 0x4) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ftruncate(r4, 0x7fff) sendfile(r2, r4, 0x0, 0x8040fffffffd) 14:10:24 executing program 4: socketpair(0x11, 0x75f2c00946892cb6, 0x1, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/checkreqprot\x00', 0x440400, 0x0) pwritev(r1, 0x0, 0x106, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/rtc0\x00', 0x80080, 0x0) ioctl(r6, 0x5, &(0x7f0000000c00)="e4980515748ff7f51170397f87b4fc5d1cfec2") fchdir(r5) poll(&(0x7f0000000440)=[{r3}, {r2, 0x4422}, {r4, 0x14}, {r4, 0x1000}], 0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000b80)=""/26) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) preadv(r4, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/200, 0xc8}, {&(0x7f0000000600)=""/46, 0x2e}, {&(0x7f00000006c0)=""/152, 0x98}, {&(0x7f0000000780)=""/42, 0x2a}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/236, 0xec}, {0x0}, {&(0x7f00000009c0)=""/184, 0xb8}], 0x8, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x4) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3f", 0x69, 0xfffffffffffffffb) r7 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r7, 0x4018aee1, &(0x7f0000000200)={0x0, 0x5, 0xffffffff00000000, &(0x7f00000001c0)=0x10001}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0bc5351, &(0x7f0000000280)={0x7, 0x0, 'client1\x00', 0x3, "aa910a574ad66d45", "4da870ba178e36359c1c9894568fcb5192b3a8824926d79d2a30929543ba324c", 0x4, 0x3}) syz_emit_ethernet(0x7a, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r8 = fcntl$getown(r0, 0x9) syz_open_procfs(r8, &(0x7f00000003c0)='fdinfo\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) [ 204.049246] XFS (loop2): unknown mount option [subj_type=syz0]. [ 204.121799] tmpfs: No value for mount option ' 3333ff00001a [ 204.121799] 36 team_slave_1 1 0 3333ffaaaa1a [ 204.121799] 36 team_slave_1 1 0 3333ffaff80e [ 204.121799] 25 veth0_to_bridge 1 0 333300000001 [ 204.121799] 25 veth0_to_bridge 1 0 3333ff00001b [ 204.121799] 25 veth0_to_bridge 1 0 01005e000001 [ 204.121799] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 204.121799] 26 bridge_slave_0 1 0 333300000001 [ 204.121799] 26 bridge_slave_0 1 0 01005e000001 [ 204.121799] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 204.121799] 33 veth0_to_team 1 0 333300000001 [ 204.121799] 33 veth0_to_team 1 0 01005e000001 [ 204.121799] 33 veth0_to_team 1 0 3333ff00001f [ 204.121799] 33 veth0_to_team 1 0 3333ffaaaa1f [ 204.121799] 27 veth1_to_bridge 1 0 333300000001 [ 204.121799] 27 veth1_to_bridge 1 0 01005e000001 14:10:24 executing program 3 (fault-call:3 fault-nth:5): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)='hsr0\x00', 0x10) fsetxattr$security_smack_transmute(r0, 0x0, &(0x7f0000000140)='TRUE', 0x4, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x40, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800000000000060, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400000021c100200125bd7000fedbdf250a00080000000000000000000000bd0000007fc0eca7c4ab443efc2251bbe4658a"], 0x1}}, 0x0) 14:10:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:24 executing program 4: socketpair(0x11, 0x75f2c00946892cb6, 0x1, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/checkreqprot\x00', 0x440400, 0x0) pwritev(r1, 0x0, 0x106, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/rtc0\x00', 0x80080, 0x0) ioctl(r6, 0x5, &(0x7f0000000c00)="e4980515748ff7f51170397f87b4fc5d1cfec2") fchdir(r5) poll(&(0x7f0000000440)=[{r3}, {r2, 0x4422}, {r4, 0x14}, {r4, 0x1000}], 0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000b80)=""/26) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) preadv(r4, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/200, 0xc8}, {&(0x7f0000000600)=""/46, 0x2e}, {&(0x7f00000006c0)=""/152, 0x98}, {&(0x7f0000000780)=""/42, 0x2a}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/236, 0xec}, {0x0}, {&(0x7f00000009c0)=""/184, 0xb8}], 0x8, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x4) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3f", 0x69, 0xfffffffffffffffb) r7 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r7, 0x4018aee1, &(0x7f0000000200)={0x0, 0x5, 0xffffffff00000000, &(0x7f00000001c0)=0x10001}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r7, 0xc0bc5351, &(0x7f0000000280)={0x7, 0x0, 'client1\x00', 0x3, "aa910a574ad66d45", "4da870ba178e36359c1c9894568fcb5192b3a8824926d79d2a30929543ba324c", 0x4, 0x3}) syz_emit_ethernet(0x7a, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r8 = fcntl$getown(r0, 0x9) syz_open_procfs(r8, &(0x7f00000003c0)='fdinfo\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) 14:10:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x40080042, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) [ 204.339448] XFS (loop2): unknown mount option [subj_type=syz0]. [ 204.360609] FAULT_INJECTION: forcing a failure. [ 204.360609] name failslab, interval 1, probability 0, space 0, times 0 [ 204.423376] CPU: 1 PID: 8400 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 204.430452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.439809] Call Trace: [ 204.439829] dump_stack+0x138/0x19c [ 204.439849] should_fail.cold+0x10f/0x159 [ 204.439865] should_failslab+0xdb/0x130 [ 204.439877] kmem_cache_alloc+0x2d7/0x780 [ 204.439892] ? lock_downgrade+0x6e0/0x6e0 [ 204.439908] alloc_vfsmnt+0x28/0x7d0 [ 204.439921] vfs_kern_mount.part.0+0x2a/0x3d0 14:10:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 204.462594] do_mount+0x417/0x27d0 [ 204.470772] ? copy_mount_options+0x5c/0x2f0 [ 204.470783] ? rcu_read_lock_sched_held+0x110/0x130 [ 204.470795] ? copy_mount_string+0x40/0x40 [ 204.470808] ? copy_mount_options+0x1fe/0x2f0 [ 204.470820] SyS_mount+0xab/0x120 [ 204.470827] ? copy_mnt_ns+0x8c0/0x8c0 [ 204.470840] do_syscall_64+0x1e8/0x640 [ 204.503664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.503685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.503694] RIP: 0033:0x459829 14:10:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:25 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000600)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="d8ede34f59e68d627d0edc7a09e61ef66dc3d0ec97781228f4d769d47ee4af3bceb1889c74a2f0e254d16b6c81688d1529b8ec9f72b6f92c5a9183947137a0da3a2bf348727b324a905f9396ff65d662e4f942f0214d38b5dfc8e188c5e9ced61167ff31fc79db066f486d3bd5c6c3363e9ea4bf73d5cd2c122b8d61c454ca317d60b687f90c83012ecc4b5881668629cd991d855841c4b0dc30672c4ad96e4214ca9b0943113ce59bdb5e806d22bcbcfe3b505288137fac28eb1182a8f8020e7e6f65d0f9c538a2c116360caf28cd7b078d16935a29ff021eaf940b39f69303d09ff6267337d215ca69e5b27422b0972ba0c4807569b48baeb683f74695c9c4a2e8eef13918b077fd04757e453536cf84583dcbad171e16a91705c460b024d96721bbc7753090206d41933ed68e49760151cf4aba1d0c038ec0db8672f63545fab87f38d72e3e8a68bdfa7891867477dd5fc2d5049728754950de9d2dbf6f33e40eb1e6bfa5d759d205523ea3d21c563bf25b46906cc7cde21d21e7f55b572d9baf6ad366617fde91c1433aaf6de6b5ea29e480c787961ba6806af0aebb8b1485ccd682d684ef8e9e8b76e831fe9886b5d2bd5468427e3e55d3ea8695b2e212c51341ea4f50c0c84407930f0fb437b03c1ea33d97aad7f21f2f8ed338352b464e7914d814cc5d3cab2a31978b513dc193bfa5a74dda0b75c563692703a54e8f01e1616b2d01d21eb2f58047a05f3bd0ebf3fc895227330b04e3f25f19ba0f2c33cf1502b03ce3643ca304eac4c55ff4e56a7c57025dc9cc0d9432c2606e1a6624f6d9d1856130a9bf84bf4116ce9a2deaea6cef1c508259da46015904573a4d64c0ae1cbc91f9a68426cae8834cb5dcf7b5fa495fd1cecb303bdad122520eea07c48ed0e9814f1c9f4e8aa24f837080e6874edd89608eda701455b471504821e1de7157fcfad1277b3a166a56841d6f0ec8bdf7d00e39cf5680143cd1ffd5aaedb503b9ce4449ee86c30ec04c59e820b069d3b4c01d7dd2f4d2695764d9e6b510f3a59c491aac05bf6a870f3abe5ef9df6bfe6d1ad97c396d13567b70fa93528b2ec9e9b88ac0a65124e4d749bf614dca5134ea7fadaefa0ac478283fa26db93f51c4f64f8acaf4213aefa187e73617ba4a636f2bb03f0214d1af3de058c82f93dc90ef8fd4729335f246a6e410054507e9764f3b3aecdf60437c06d7df923c15d8dba608cdc87f5e50c4478f3a27bea5a28c5b33daa8a3bd89eb2b98a8251dfeb27c7079eff23c0cc47ab0606bc80f3cd60f48edf584dedc7bd4fc9985c86b3965bf250bc8ebf7986b8de73be6c82580a4b476ef246f1b775ad74429c5b8027ebfae7c9da7670bd5a9beb70eee55109c49fc942695122b0ba8aa031ba38684cf1b3c391540fc0e94370c19c44a8ed1def5746d23e0365385295b35cac6d3e4c5b6eed5f10a671ac5e4fb877a098049244983322b36c9167a3caa7a892cd226610b3c833a3f75f2029dd387dc7752a9d8e28e5ba1267de923af0e28d6b32e8490cf23773c88edea2c46683b8e1e195bef3983deca9a4a38f79f1a494b329f06276855a4500d599fd4e08a1c6512b07e3012622ecd3bd8cc6350afde019f675b8ebaa43c98173fe546c174aff0f79c0b877a0a7fcd42bcffd03f86da1f7bd2ed0615a894aa1e9f44629cbdeaca33b3b255a654dc758e22c63d9ac4913f76332ce62ec07008e8caf44242425b90dfa2afb878080d4e6c729847af7ae1091dd95dd42a19e51576b2b27a964afa868c246c0c1ef9c69aa41a6c22e9ec7e690c6b70af504d7067f507b18d9c94b1b9e836e1ac83adbee32bdabd9bda20cd874fb36eff2802517674244fd988fcf7d3724d839034bffda0b71169c46bf53761c32c639d7d7fd8764e2b3c53abbf49e734ad0ef08f3d3e50b8c25afe83c1d9362270a489b9223b688a419c5ddb776409ad806a585b53d451ff0863634c09cabed2cbefcff409b1b9982ffa0753f137c638b622a6f12ad0ecd71954b6f5ff5407b82730e7176a9a5340d6f2f216e56aeb24c0d9d67c64e4cf97fd0087dfa294ca5d70c98a304c5ca93d0e811602e154cc6734d8cf7289f44bb18b887e2d6dda03b6fda16235e982fd40a87f5dc15fda4dd22d1634e37307db9a548e2d4e93e4804ff75dd2cb43048f859bb2d7afd128643132eb1464c73c94d7117e0b65e0be7772ebb4a15bff4b664b36af6659912fbbdd6050b7fbbd29e789a030f8848c189a5af71d9ecc6ed53d9cc6a5a1d084ba81ef940b5911eba3b8aca1b166aee0890fba1873c4de642e49b7d3883ef90b3ce2b66b95ed0ceb4e7231a0bbd808560190dbd3e17595df8d13c6f10a0136d4e542117ca3d25e50abd7368153a9157cc7ebf4bd47f1ca696658d9c2469a1f308d72201317696af534349e79cd910c60319d8b2be8422b21b5f22836d2e111fb07a67adba0dcec5f1a98820972d1c6e0e2f334c3c39274ae220b8a96d249f2dd5ed2a0c2841b6cb4b7c5b93f78bee39c7f551fbf332bdd781d257bdeb72aeb395e1733014c0326a8b993b24cd94d9c41109e975e181ad4d4cf245fcc54c14ec0719e1921a32daa684db7d9e47e5ee03b9b4c953a357bd1e1d39f993b1ac6427f12a4bfc7033b989308795809e88f8d4eeec7ed60445ba6815398bf5e2f4dfa609a72459cc5f6719d485923756e625fc6928c96256bbef05e62c397817a43d5ff2a73de5f6316359280452530b576f76e35a86f7519215136c7f90373d4fe695e63fc9802add62e08b91e1b34c0c95cf866b0e2c59dd08ca65ebf753ad6a9087069de1ef5844395ff72b4fa8c9a1feadcbad9726aab95e59e18b2c77c11c5c3fda71ba95669b4bc449bf925df4dc74847e416fad1a99c860608f79bab318fa44e87a316f995b090c147b5227b6696cd7f04bb88fc8c7d508352f7a13362db2ef00e77d3702e8aa4c82081b0e74a812f28c4289bba83d8162c658e5f584140bebb886d79ab6e19eed8bd6df32869695a27ff619b1d99ce7f9c238e140be19860b5b320f9d974a822e2162baa3e6a942eb8d70c5efa3e20f6bd049490d3dbc8f38e826fede7dc667b1945eb64c779fecfed99846afbfe30840bd01c0ccad286fab1f0253d7ace2b0df4ee739bb4da83dff36e1e150cc68c3b5d5171f2a372b9d498db1d1b78b3aabbda1990603012deff0a0145b2ff6b1923231239a6058dd1f3cf1ecc56163c09e691764f331a2626418be99bd8f048341d229c74bb6b796df8d6b9052a113a1491ba3ba670693c3eefd6ec12cffe3cc1d146b370ebf55c7791d4267e9728d879dc6a1bd401130428bc11e3423a9603a239c6d4aa1782313c5f8dfb65ea1fd6f08ccdf21fcdd81725dc3d11a82cacd74c920cfd384caa5254a2b83e3263e821c0773830d5daed587eda71544b7f12f3487cf20775f7fe00b854a057f02d0127e8894374dd780f31bc038fda17aa2262ad484eb8df277e8ebc7ee292594b6d3796c48c842926f55a5fd5e979dd8581d674ad608daed2ca02d4e47965b4bada02382983b775e66005d280672572428636a4081d9eb012da74e8de297ddfa41615a1aca369386a5c7b853f28788d416f388e3fad8a79c308188f85a587829e85c7763cd741b8a87c34d5655e869ccbc8e2c7baf079b0e0471245ae59b50a085342d2c044fbaefc861447544cae99e942bebe17f51de35112d9c826632c8d98a44bbfe6d4bff98a654a798343a4f53693bb5cf695c58dcaff67bb7364e127a1c25d680dd9c220b4b2401fd4a773c62fef657144c92fd2083dc9876ee8e827bbad9d97119c73b75d41802fe119c8f2abb1da3d15eed1d436ba4ff0788cfc54c2193c518605bcac0790e8e8e37d442e76e53cb633e71b9935088dbb15880a73b6f929f856c48c37ed3c5e308dbb86c3aef9faf8f62e174848c229f96002d712591fedb1be4e0902788cd943d678aee8dba3479aac7dc075033ce276372f4eb5080f9b46822e21252e9d8cf882f4c39c8e651102d48e48345b1b35096e407ca2147f729ea1d380d9e1f326124faf9e6709736d65f6d37da2b389570717731804b0254ba54f8d4551fe77391b530fff047de1d868e283497b6403d242503d49cf0771a84d17323b36f7073d57916076b126dd832eafc14aad15112ad2f4fa260bef086942dc5f9d30e60d658598522a23bdbe50d75de6478b3a8e7edfbcdd7eb31182a1670b070d9fad4ddf2b2e8a3429019a65ce5e833e09565ae48ba122b0a71697a5b3ee63bcf5878e86682c69d48985a942a6eb5e398436edf4b2d1e4acb4c5d5e1833c6b0b90577a7f2c883b1a8135bbcd3600762d30810748572669d1fa5612390b2731a7e66b5d9bb85fb00dd337de8448a60fddf3ef30717071e7a87e77909e3b858b032f9560edb67093b2bf294b237bbc408493b455dc043ccd8e437e1f141a095f0be7fe2f0f97308f015974e8b38b52d907085a1606bec0da919e8a44581540243bf2f799d938a1d7da1497ea38623d90e31c7d094cecb0466a7f0569af4373aa6f463429587f1ea2940f4daec68037f943ef42bfd58ce9c4e0c3c7087e37ab1cdfd2f08508012361d2b447cddf98fcd095d89f1409539010b2d5eb5e0273a820a4f3bc977ab83214e9e0977c09e97d1e35c5325015f55015909037224054435f1697c5b61dd6cb99d658659f13f6720e40414aa66bf8b8858fdd9a710d533cbd2234c169ef2cd56a9748df93c86cf242cadceff818b1416a23c3cd60d7db0c3347ca2f4e61ff2cf8ab5677728994699cd34cf2be594eb847a60cde17fce1c9c542fc1f8d99b27ceab66ae6c5b9c197c9d50e23e1a546c67e4509690f2f36b974ff35a5e60f89b384771f039b472ca48858970e2da348791d79ef940a88da36be6ac410a41c9c9c4fae74f272cfa517f04d23d08b316ff237a744359853150d7c4b41667bdb289be9c85ea4a07161baf59843d5c3c7583f6c30da25ef1af6ca38068cdfdd6b9ab307c2d8b36f8db134f2ceba04e6696eb3581fd9e800bee6491b4f1bd398d6ad487a384e4e87f99e3a8aea50254495dab34a4de8da07061ffe80aeed8f2ad29982edae907700406bd77ac6798ea5f5914f8612aedf8447b7d0af38516a7560451b15f3a86d1006c23946b77db8240132e4d8ad702c58f6c5ff752d2bc672ebe289d3c9dbc7ac4dfd58f7f6c30368e5c01b4ee50d7c20d1e0f23eb0406cbf9a05f6d4527ce7ed58d5469767ef66175781715b02eeb0a2d7ccb8a8b8edf7fbe313dc2cdca33ab786441aba521e1aeca9586a2a932c94078cd80523d84b52df2361fff3911b2de924a6ef1585a5586d3a9c032d8752a3fcb5b185f6e78fddaffc68301981c8c45d515887ad5484962cc91ce11e86c74263b3005ca33802e35d65881147686d87ae81f6df8c0a91dba924c071283eff57cdbea5bb1a5ddbd52d46b83b86fe94b5ba9f03ef93584d02987e62aa34c29aef7973e88c7c6d8210085e27a53866a92be96ec4d605756aa2806bb15aaca52acbae6549214fdd7d33d5fbccccbb301310404f69d43fb777d1316aa46718b0644dd40089ba7b2bb72df395ba2ab396c4a0458c", 0xf80, 0xfffffffffffffff8) r0 = add_key(&(0x7f0000001680)='logon\x00', &(0x7f00000016c0)={'syz', 0x1}, &(0x7f0000001700)="2bcd700db6d1c0aa3a86e2a0c82e799b535e339f9d8685256c612483d0b1693bf620382a6e3332696c0d76097c2aa8db5a3672697a771280c5114eaaeacfb7df25214803792db32c92faf4b2c54da0d40ca002c1c9afae1719a30b1a175f4ee9822d46a2a4cbed9116a927648d40d80480f5ba", 0x73, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x39a, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) eventfd2(0xffffffffffffffbd, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = getuid() setfsuid(r3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000200)=0x5, 0x4) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ftruncate(r4, 0x7fff) sendfile(r2, r4, 0x0, 0x8040fffffffd) [ 204.503699] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 204.503710] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 204.503716] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 204.503728] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 204.525305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 204.525312] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:25 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x6000, 0x0) fcntl$dupfd(r0, 0x406, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x10200) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) read(r6, &(0x7f0000009f9c)=""/100, 0x64) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000040)={0x4, 0x6, 0x1, 0x0, 0x0, [{r6, 0x0, 0x3}]}) connect$inet6(0xffffffffffffffff, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$FUSE_OPEN(r5, &(0x7f00000000c0)={0x20, 0x0, 0x6}, 0x20) readv(r3, &(0x7f0000000580), 0x3c1) 14:10:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 204.663640] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:25 executing program 3 (fault-call:3 fault-nth:6): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x100) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 14:10:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 204.895486] XFS (loop2): unknown mount option [subj_type=syz0]. [ 204.900786] FAULT_INJECTION: forcing a failure. [ 204.900786] name failslab, interval 1, probability 0, space 0, times 0 [ 204.925274] CPU: 0 PID: 8446 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 204.932330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.932337] Call Trace: [ 204.932353] dump_stack+0x138/0x19c [ 204.932374] should_fail.cold+0x10f/0x159 [ 204.952065] should_failslab+0xdb/0x130 [ 204.956040] kmem_cache_alloc_trace+0x2e9/0x790 [ 204.960699] ? lock_downgrade+0x6e0/0x6e0 [ 204.964840] sget_userns+0xfe/0xc30 [ 204.968452] ? get_anon_bdev+0x1c0/0x1c0 [ 204.972499] ? get_anon_bdev+0x1c0/0x1c0 [ 204.976547] ? get_anon_bdev+0x1c0/0x1c0 [ 204.980587] sget+0xd6/0x120 [ 204.983590] ? selinux_sb_copy_data+0x21e/0x390 [ 204.988239] ? shmem_remount_fs+0x580/0x580 [ 204.992543] mount_nodev+0x31/0xf0 [ 204.996063] shmem_mount+0x2d/0x40 [ 204.999594] mount_fs+0x97/0x2a1 [ 205.002946] vfs_kern_mount.part.0+0x5e/0x3d0 [ 205.007424] do_mount+0x417/0x27d0 [ 205.010955] ? copy_mount_options+0x5c/0x2f0 [ 205.015346] ? rcu_read_lock_sched_held+0x110/0x130 [ 205.020354] ? copy_mount_string+0x40/0x40 [ 205.024660] ? copy_mount_options+0x1fe/0x2f0 [ 205.029137] SyS_mount+0xab/0x120 [ 205.032569] ? copy_mnt_ns+0x8c0/0x8c0 [ 205.036455] do_syscall_64+0x1e8/0x640 [ 205.040341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.045169] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.050338] RIP: 0033:0x459829 [ 205.053509] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.061195] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 205.068442] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 205.075780] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 205.083038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 14:10:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:25 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000600)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="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", 0xf80, 0xfffffffffffffff8) r0 = add_key(&(0x7f0000001680)='logon\x00', &(0x7f00000016c0)={'syz', 0x1}, &(0x7f0000001700)="2bcd700db6d1c0aa3a86e2a0c82e799b535e339f9d8685256c612483d0b1693bf620382a6e3332696c0d76097c2aa8db5a3672697a771280c5114eaaeacfb7df25214803792db32c92faf4b2c54da0d40ca002c1c9afae1719a30b1a175f4ee9822d46a2a4cbed9116a927648d40d80480f5ba", 0x73, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x39a, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) eventfd2(0xffffffffffffffbd, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = getuid() setfsuid(r3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000200)=0x5, 0x4) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ftruncate(r4, 0x7fff) sendfile(r2, r4, 0x0, 0x8040fffffffd) [ 205.090289] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget$private(0x0, 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3, 0x1, 0x5, 0x0, 0x0, 0x100000001, 0x8, 0x1, 0xf4, 0x3, 0x6, 0x0, 0xff, 0x7fff, 0x51fb, 0xfffffffffffffff9, 0x2, 0x2, 0x5, 0x63, 0x9, 0x0, 0x3, 0x7fff, 0x4, 0x4, 0x1800, 0x4, 0x8, 0x8d, 0x0, 0x80000001, 0x6, 0x20000000000, 0x9, 0x8000, 0x0, 0x101, 0x1, @perf_config_ext={0x4, 0x5}, 0xc00, 0x5, 0x800, 0x7, 0x101, 0x100, 0x81}, r1, 0x5, 0xffffffffffffffff, 0x1) msgsnd(0x0, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES16=r1]], 0x1, 0x0) msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/157}, 0xa5, 0x3, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) 14:10:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='n\x99\x9f\xc0|0x0, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000200)={r1, r2, 0x800}) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 14:10:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 205.192950] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:25 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xa100, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x5d) syz_read_part_table(0x0, 0x2, &(0x7f0000002d00)=[{0x0, 0x0, 0x8001}, {&(0x7f0000000d00)="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", 0x1d0, 0x6}]) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x5, 0x4) 14:10:25 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20321798c481a14337b6d46eb98921d3dc9449901bfe9b0700000000000000943fcb2b000000000000994e3690c53ebf10e9615a9d6800aa0f"], 0x1}}, 0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000100)={0x0, 0x13, 0x0, @thr={0x0, &(0x7f0000000280)="54ee4cb6855161b90f74923f42d77b3a5430cbfde67f7d4dba"}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) select(0x40, &(0x7f0000000080)={0xff, 0x1000, 0x7, 0x6, 0x5, 0x6, 0x0, 0x8}, &(0x7f0000000240)={0xb9, 0x3, 0x23fd, 0x1000, 0x8, 0x9fc, 0x9, 0x6}, &(0x7f00000002c0)={0x4, 0x10001, 0x42edc879, 0x0, 0x6, 0xf9d5, 0x5, 0x2}, &(0x7f0000000300)={0x77359400}) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000380)={0x0, 0x100, "74dea80a3a2c256dec6c16e520c924fa9418f0bb8ddcb13c3ee7a8347b728ae8", 0xffffffffffffff60, 0xc3, 0x7e0f, 0x3ff, 0x3, 0x9, 0x7f, 0xfffffffe0, [0xeca, 0xae4, 0x1, 0x8]}) wait4(r1, &(0x7f0000000040), 0x4, &(0x7f0000000180)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:10:26 executing program 3 (fault-call:3 fault-nth:7): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:26 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/autofs\x00', 0x400000, 0x0) connect$inet6(r0, &(0x7f0000002540)={0xa, 0x4e22, 0x4cb2, @remote, 0x81}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002500)='/dev/hwrng\x00', 0x101000, 0x0) r2 = openat(r1, 0x0, 0x20200, 0x82) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002440)={&(0x7f0000002580)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="04007c00d0005400532c8db927ae1c249d17fa521a8d0d239bd74e64df00450c242a016ee401d76803b9d37f131290d830b352bb67cad03154655457d57b088460c2d0726d6d7ab1af6f6807caa5fc8b3eb7ed47b647c7ab205e8fb67f88c2a9d5d4607523c5efaa8a261b86bc54a4de31b55177a9a91f9ab88f2be563b0f0b2db1b576d4e8630facfeeabcc1af716fab3ffdbd823fb7474054220cb083dc628ce26264048be5e9a34b474f3e64fbe57562851fbb030c22276ced6ab9640e084f6ff2812c8ee8ef1ae8aa156db0a9dec5b000000"], 0x2234}, 0x1, 0x0, 0x0, 0x4048804}, 0x40000) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000440), 0x400000000000211, 0x810) 14:10:26 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0x75, [], 0xa, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/117}, &(0x7f0000000240)=0x78) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x8010000, 0x8) [ 205.493636] XFS (loop2): unknown mount option [subj_type=syz0]. [ 205.537458] FAULT_INJECTION: forcing a failure. [ 205.537458] name failslab, interval 1, probability 0, space 0, times 0 [ 205.577590] CPU: 0 PID: 8499 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 205.584652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.594009] Call Trace: [ 205.596611] dump_stack+0x138/0x19c [ 205.600273] should_fail.cold+0x10f/0x159 [ 205.604443] should_failslab+0xdb/0x130 [ 205.608435] kmem_cache_alloc_trace+0x2e9/0x790 [ 205.613108] ? lock_downgrade+0x6e0/0x6e0 [ 205.617259] sget_userns+0xfe/0xc30 [ 205.620885] ? get_anon_bdev+0x1c0/0x1c0 [ 205.624941] ? get_anon_bdev+0x1c0/0x1c0 [ 205.629013] ? get_anon_bdev+0x1c0/0x1c0 [ 205.633077] sget+0xd6/0x120 [ 205.636104] ? selinux_sb_copy_data+0x21e/0x390 [ 205.640782] ? shmem_remount_fs+0x580/0x580 [ 205.645286] mount_nodev+0x31/0xf0 [ 205.648839] shmem_mount+0x2d/0x40 [ 205.652387] mount_fs+0x97/0x2a1 [ 205.655757] vfs_kern_mount.part.0+0x5e/0x3d0 [ 205.660257] do_mount+0x417/0x27d0 [ 205.663797] ? copy_mount_options+0x5c/0x2f0 [ 205.668200] ? rcu_read_lock_sched_held+0x110/0x130 [ 205.673201] ? copy_mount_string+0x40/0x40 [ 205.677437] ? copy_mount_options+0x1fe/0x2f0 [ 205.681912] SyS_mount+0xab/0x120 [ 205.685363] ? copy_mnt_ns+0x8c0/0x8c0 [ 205.690593] do_syscall_64+0x1e8/0x640 [ 205.694458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.699281] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.704454] RIP: 0033:0x459829 [ 205.707647] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.715357] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 205.722611] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 205.729875] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 14:10:26 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000600)='.dead\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)="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", 0xf80, 0xfffffffffffffff8) r0 = add_key(&(0x7f0000001680)='logon\x00', &(0x7f00000016c0)={'syz', 0x1}, &(0x7f0000001700)="2bcd700db6d1c0aa3a86e2a0c82e799b535e339f9d8685256c612483d0b1693bf620382a6e3332696c0d76097c2aa8db5a3672697a771280c5114eaaeacfb7df25214803792db32c92faf4b2c54da0d40ca002c1c9afae1719a30b1a175f4ee9822d46a2a4cbed9116a927648d40d80480f5ba", 0x73, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x39a, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) eventfd2(0xffffffffffffffbd, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = getuid() setfsuid(r3) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000200)=0x5, 0x4) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ftruncate(r4, 0x7fff) sendfile(r2, r4, 0x0, 0x8040fffffffd) 14:10:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5b, &(0x7f0000000340)=0x1, 0xfffffffffffffeba) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x20, 0x4) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000140)={0x8001001, 0x6017, 0x1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600400000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="05fb995a"], 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f00000001c0)={0x1, 0x9, 0x4, 0x80001001, {0x0, 0x7530}, {0x4, 0x8, 0xffffffffffff96ff, 0x4, 0x3, 0x7, "37a0dbec"}, 0x7, 0x2, @offset=0x2, 0x4}) 14:10:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000140)="7c0cb5a78f85e579582246faa5c952d8d6c110d7228f05409c404145f83faa4c86", 0x21}], 0x1}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x54, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, [@migrate={0x4}]}, 0xffffffffffffffb7}}, 0x80002) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 205.737127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 205.744380] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:26 executing program 3 (fault-call:3 fault-nth:8): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 205.833990] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:26 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xed1149a9c4268175, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000040)={@dev, 0x0}, &(0x7f0000000080)=0x14) r2 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@remote, 0x4e21, 0x6, 0x4e22, 0x0, 0x0, 0xa0, 0xa0, 0x3a, r1, r2}, {0x0, 0x4, 0x9, 0x0, 0x1, 0x6, 0x100000000, 0x80}, {0x40, 0x100, 0x138a, 0x80}, 0x5, 0x6e6bb4, 0x0, 0x1, 0x0, 0x3}, {{@in6=@mcast2, 0x4d4, 0x3c}, 0xa, @in=@broadcast, 0x0, 0x0, 0x2, 0x3, 0x0, 0x800, 0x1f}}, 0xe8) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00004da000), 0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000007affc), 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") close(r4) 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:26 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="36bdb38e2c18471a876d8bb84f35c6871b9f00"/33]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x8e56b071b577b247, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) truncate(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000540)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85eb}}}, 0x90) [ 205.904646] FAULT_INJECTION: forcing a failure. [ 205.904646] name failslab, interval 1, probability 0, space 0, times 0 [ 205.980804] CPU: 0 PID: 8526 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 205.987864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.997226] Call Trace: [ 205.999833] dump_stack+0x138/0x19c [ 206.003478] should_fail.cold+0x10f/0x159 [ 206.007646] should_failslab+0xdb/0x130 [ 206.011632] kmem_cache_alloc_trace+0x2e9/0x790 [ 206.016318] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.021778] ? sget_userns+0xfe/0xc30 [ 206.025590] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.030616] selinux_sb_alloc_security+0x46/0x220 [ 206.035467] security_sb_alloc+0x6d/0xa0 [ 206.039534] sget_userns+0x196/0xc30 [ 206.043254] ? get_anon_bdev+0x1c0/0x1c0 [ 206.047327] ? get_anon_bdev+0x1c0/0x1c0 [ 206.051411] ? get_anon_bdev+0x1c0/0x1c0 [ 206.055471] sget+0xd6/0x120 [ 206.055484] ? selinux_sb_copy_data+0x21e/0x390 [ 206.055495] ? shmem_remount_fs+0x580/0x580 [ 206.055505] mount_nodev+0x31/0xf0 [ 206.055515] shmem_mount+0x2d/0x40 [ 206.055525] mount_fs+0x97/0x2a1 14:10:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 206.063197] vfs_kern_mount.part.0+0x5e/0x3d0 [ 206.063210] do_mount+0x417/0x27d0 [ 206.063219] ? copy_mount_options+0x5c/0x2f0 [ 206.063229] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.063240] ? copy_mount_string+0x40/0x40 [ 206.063260] ? copy_mount_options+0x1fe/0x2f0 [ 206.077469] XFS (loop2): unknown mount option [subj_type=syz0]. [ 206.077963] SyS_mount+0xab/0x120 [ 206.077975] ? copy_mnt_ns+0x8c0/0x8c0 [ 206.077990] do_syscall_64+0x1e8/0x640 [ 206.077999] ? trace_hardirqs_off_thunk+0x1a/0x1c 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:26 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x40) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000002c0)={0x5, 0xcf26, 0xb68, 0x5}, 0x10) add_key(&(0x7f0000000280)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0xe5, 0x800) sendto$packet(r1, &(0x7f0000000040)="83c156bac9b8fc203c6a8d4b54e7f94808545871303ca839743968d9e92ea147efe3ebddb793c56d", 0x28, 0x40000, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) r2 = fcntl$getown(r1, 0x9) write$cgroup_pid(r1, &(0x7f0000000240)=r2, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r3, 0x100000000}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r4, @in={{0x2, 0x4e23, @local}}, 0x7f, 0x401, 0x9976, 0x4, 0x2}, 0x98) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r5, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@empty, @initdev}, &(0x7f00000000c0)=0x8) [ 206.078016] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.110273] RIP: 0033:0x459829 [ 206.110280] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.110290] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 206.110294] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 206.110300] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 206.110305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 206.110310] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:26 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4000) r1 = syz_open_dev$radio(&(0x7f0000000a00)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) syz_genetlink_get_family_id$net_dm(&(0x7f0000000900)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40004) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9}}], 0xfffffffffffffe3e, 0x1}, 0x0) getsockname$tipc(r1, &(0x7f0000000640)=@name, &(0x7f0000000800)=0x10) 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:26 executing program 3 (fault-call:3 fault-nth:9): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @remote}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000240)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x10}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x1000044, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000780300000000000000000000e800000000000000e0010000080300000803000008030000080300000803000004000000ce9eb89da319b6d63c0c4955fd16c7a88b", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000100000000000000"], @ANYBLOB="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"/878], 0x3) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={0x0}, 0x10) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000740)=0xfffffe30) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x3, 0x0) poll(0x0, 0x0, 0xffffffff) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x2000000000000009) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000c00)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0xffffffffffffff93) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvmsg$kcm(r4, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0xfffffdde}], 0x8}, 0x0) [ 206.293020] audit: type=1400 audit(1564927826.885:61): avc: denied { ioctl } for pid=8544 comm="syz-executor.4" path="socket:[30678]" dev="sockfs" ino=30678 ioctlcmd=0x89f9 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 206.335772] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000032000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="2deb68c4bc7444c75eb7be8653dd", 0x0, 0xf0}, 0x28) [ 206.354040] FAULT_INJECTION: forcing a failure. [ 206.354040] name failslab, interval 1, probability 0, space 0, times 0 [ 206.375815] CPU: 1 PID: 8562 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 206.382871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.392231] Call Trace: [ 206.394841] dump_stack+0x138/0x19c [ 206.398468] should_fail.cold+0x10f/0x159 [ 206.402659] should_failslab+0xdb/0x130 [ 206.406643] __kmalloc+0x2f0/0x7a0 [ 206.410189] ? __list_lru_init+0x6b/0x660 [ 206.414345] __list_lru_init+0x6b/0x660 [ 206.418324] sget_userns+0x500/0xc30 [ 206.422031] ? get_anon_bdev+0x1c0/0x1c0 [ 206.426093] ? get_anon_bdev+0x1c0/0x1c0 [ 206.430157] sget+0xd6/0x120 [ 206.433258] ? selinux_sb_copy_data+0x21e/0x390 [ 206.437927] ? shmem_remount_fs+0x580/0x580 [ 206.442241] mount_nodev+0x31/0xf0 [ 206.445773] shmem_mount+0x2d/0x40 [ 206.449301] mount_fs+0x97/0x2a1 [ 206.452662] vfs_kern_mount.part.0+0x5e/0x3d0 [ 206.457156] do_mount+0x417/0x27d0 [ 206.460692] ? copy_mount_options+0x5c/0x2f0 [ 206.465101] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.470113] ? copy_mount_string+0x40/0x40 [ 206.474348] ? copy_mount_options+0x1fe/0x2f0 [ 206.478838] SyS_mount+0xab/0x120 [ 206.482281] ? copy_mnt_ns+0x8c0/0x8c0 [ 206.486166] do_syscall_64+0x1e8/0x640 [ 206.490046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.494885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.500162] RIP: 0033:0x459829 14:10:26 executing program 4: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) truncate(&(0x7f0000000200)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x1000) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x1cdbaad4e110a182) sendfile(r1, r2, 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e23, 0x3, @rand_addr="312d975c9a7579ede8ed658820b78a0d", 0x8cb}}}, 0x84) 14:10:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 206.503345] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.511043] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 206.518309] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 206.525566] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 206.532833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 206.540099] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 [ 206.551676] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 14:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000080)={0x8, 0x4, 0x2}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x60, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r2, 0x825, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) [ 206.621102] audit: type=1804 audit(1564927827.215:62): pid=8576 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir821745364/syzkaller.LMS1uu/55/bus" dev="sda1" ino=16758 res=1 14:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:27 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) recvfrom$x25(r1, &(0x7f0000000100)=""/220, 0xdc, 0x41, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r3, 0x714, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x800, 0x7, 0x8, 0x302}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x1) 14:10:27 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r3, 0x7002) listen(r2, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) pipe2(0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000940)=0x2) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000740)={0x100000000, {0x100000001, 0x0, 0x1}}) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)=[&(0x7f0000000300)='/dev/loop#\x00', &(0x7f0000000580)='[wlan1%]selfnodev\x00', 0x0], 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f00000000c0)) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r6, 0x800442d3, &(0x7f0000000140)={0x15, 0x3, 0x2, @empty, 'gretap0\x00'}) poll(&(0x7f0000000180)=[{r2, 0x400}, {r1, 0x102}, {r2}, {r1, 0x8000}, {r7, 0xc005}, {r6, 0x43}, {r6, 0x2000}, {r7, 0x5}, {r2, 0x2}, {r6, 0x4008}], 0xa, 0x5) [ 206.697527] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:27 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = accept4(r0, &(0x7f0000000000)=@in6, &(0x7f00000000c0)=0x80, 0x80800) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x41, 0x800, 0x81, 0x89, 0xfff, 0x10001}, 0xffffffffffff23f6}, 0xa) shutdown(r0, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20004810, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) chdir(&(0x7f0000000140)='./file0\x00') [ 206.842088] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:27 executing program 3 (fault-call:3 fault-nth:10): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:27 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa0500000000000000c908004500001c00000000002c9078ac14118ff5ae2f60658e27bbe00000010000000000089078"], 0x0) [ 206.901650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x501000, 0x82) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000100)=""/126) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r1, 0x0) write$P9_ROPEN(r2, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x88, 0x1, 0x5}, 0x3d5}}, 0x18) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x11) dup3(r3, r1, 0x0) 14:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 206.984978] FAULT_INJECTION: forcing a failure. [ 206.984978] name failslab, interval 1, probability 0, space 0, times 0 [ 207.037014] CPU: 0 PID: 8617 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 207.044073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.044079] Call Trace: [ 207.044097] dump_stack+0x138/0x19c [ 207.044115] should_fail.cold+0x10f/0x159 [ 207.044129] should_failslab+0xdb/0x130 [ 207.067801] __kmalloc+0x2f0/0x7a0 [ 207.071346] ? __list_lru_init+0x6b/0x660 [ 207.071361] __list_lru_init+0x6b/0x660 [ 207.071375] sget_userns+0x500/0xc30 14:10:27 executing program 0: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3f, 0x20000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000240)={0x80000003, 0xfffffffffffffffd, 0x800, @discrete={0x9, 0x321}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={r0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000300)='!\x00', &(0x7f0000000400)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000540)='wlan1\x00'], &(0x7f0000000100)=[&(0x7f0000000700)='\x10\x00\x00\x00\x00', &(0x7f0000000640)='!\x00']) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000200)) [ 207.071387] ? get_anon_bdev+0x1c0/0x1c0 [ 207.079930] ? get_anon_bdev+0x1c0/0x1c0 [ 207.079940] sget+0xd6/0x120 [ 207.079952] ? selinux_sb_copy_data+0x21e/0x390 [ 207.079962] ? shmem_remount_fs+0x580/0x580 [ 207.079972] mount_nodev+0x31/0xf0 [ 207.087721] shmem_mount+0x2d/0x40 [ 207.087733] mount_fs+0x97/0x2a1 [ 207.087749] vfs_kern_mount.part.0+0x5e/0x3d0 [ 207.087763] do_mount+0x417/0x27d0 [ 207.087773] ? retint_kernel+0x2d/0x2d [ 207.087786] ? copy_mount_string+0x40/0x40 [ 207.087795] ? copy_mount_options+0x17c/0x2f0 [ 207.087808] ? copy_mount_options+0x1fe/0x2f0 [ 207.087820] SyS_mount+0xab/0x120 [ 207.094943] ? copy_mnt_ns+0x8c0/0x8c0 [ 207.094957] do_syscall_64+0x1e8/0x640 [ 207.094966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.094984] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.094992] RIP: 0033:0x459829 [ 207.094999] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 [ 207.107339] XFS (loop2): unknown mount option [subj_type=syz0]. [ 207.107477] ORIG_RAX: 00000000000000a5 [ 207.114349] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 14:10:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 207.114355] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 207.114361] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 207.114367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 207.114373] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 [ 207.334701] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:28 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r3, 0x7002) listen(r2, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) pipe2(0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000940)=0x2) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000740)={0x100000000, {0x100000001, 0x0, 0x1}}) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)=[&(0x7f0000000300)='/dev/loop#\x00', &(0x7f0000000580)='[wlan1%]selfnodev\x00', 0x0], 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f00000000c0)) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r6, 0x800442d3, &(0x7f0000000140)={0x15, 0x3, 0x2, @empty, 'gretap0\x00'}) poll(&(0x7f0000000180)=[{r2, 0x400}, {r1, 0x102}, {r2}, {r1, 0x8000}, {r7, 0xc005}, {r6, 0x43}, {r6, 0x2000}, {r7, 0x5}, {r2, 0x2}, {r6, 0x4008}], 0xa, 0x5) 14:10:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:28 executing program 3 (fault-call:3 fault-nth:11): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:28 executing program 4: ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101001, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000300)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000380)='/d\xff\xff\xff\xffnd/pcmC#D#cx', 0x12, 0x0) r2 = syz_open_pts(r1, 0x0) madvise(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xf) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f00000002c0)) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2200, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x3, 0xffffffff80000000, 0xe0000000000000}}, 0x28) sched_setaffinity(0x0, 0x241, &(0x7f0000000100)=0x2d) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x3) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000280)) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, &(0x7f0000000200)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x14) 14:10:28 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x4000, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000080)=0x4, 0xe0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="90010000", @ANYRES16=r2, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 208.000862] FAULT_INJECTION: forcing a failure. [ 208.000862] name failslab, interval 1, probability 0, space 0, times 0 [ 208.018669] XFS (loop2): unknown mount option [subj_type=syz0]. [ 208.049006] CPU: 1 PID: 8697 Comm: syz-executor.3 Not tainted 4.14.136 #32 [ 208.056075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.065434] Call Trace: [ 208.068029] dump_stack+0x138/0x19c [ 208.071668] should_fail.cold+0x10f/0x159 [ 208.075813] should_failslab+0xdb/0x130 [ 208.079771] kmem_cache_alloc_trace+0x2e9/0x790 [ 208.084422] ? get_anon_bdev+0x1c0/0x1c0 [ 208.088468] ? shmem_remount_fs+0x580/0x580 [ 208.092787] shmem_fill_super+0x52/0x8c0 [ 208.096828] ? sget+0xde/0x120 [ 208.099997] ? shmem_remount_fs+0x580/0x580 [ 208.104586] mount_nodev+0x52/0xf0 [ 208.108106] shmem_mount+0x2d/0x40 [ 208.111625] mount_fs+0x97/0x2a1 [ 208.114978] vfs_kern_mount.part.0+0x5e/0x3d0 [ 208.119453] do_mount+0x417/0x27d0 [ 208.122979] ? copy_mount_options+0x5c/0x2f0 [ 208.127374] ? rcu_read_lock_sched_held+0x110/0x130 [ 208.132374] ? copy_mount_string+0x40/0x40 [ 208.136594] ? copy_mount_options+0x1fe/0x2f0 [ 208.141075] SyS_mount+0xab/0x120 [ 208.144510] ? copy_mnt_ns+0x8c0/0x8c0 [ 208.148398] do_syscall_64+0x1e8/0x640 [ 208.152277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.157116] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.162298] RIP: 0033:0x459829 [ 208.165468] RSP: 002b:00007f40f7c17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 208.173170] RAX: ffffffffffffffda RBX: 00007f40f7c17c90 RCX: 0000000000459829 [ 208.180420] RDX: 0000000020000280 RSI: 0000000020000140 RDI: 0000000000000000 [ 208.187683] RBP: 000000000075bf20 R08: 0000000020000480 R09: 0000000000000000 [ 208.194943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7c186d4 [ 208.202196] R13: 00000000004c5e57 R14: 00000000004da7b8 R15: 0000000000000004 14:10:28 executing program 4: ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101001, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000300)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000380)='/d\xff\xff\xff\xffnd/pcmC#D#cx', 0x12, 0x0) r2 = syz_open_pts(r1, 0x0) madvise(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xf) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f00000002c0)) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2200, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x3, 0xffffffff80000000, 0xe0000000000000}}, 0x28) sched_setaffinity(0x0, 0x241, &(0x7f0000000100)=0x2d) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x3) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000280)) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, &(0x7f0000000200)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x14) 14:10:28 executing program 3 (fault-call:3 fault-nth:12): mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:28 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$int_in(r2, 0x5473, &(0x7f0000000180)=0x8000) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000280)={0x5, &(0x7f0000000240)=[{0x8, 0x3}, {0x9, 0x5b}, {0x2, 0x4}, {0x6, 0x1}, {0x2, 0x6}]}) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000001580)='Y', 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="584ea1aeb4f30090f669b72c7ecb4fa76a71fc7bbab2062a3a484ac240a9de339bb6", 0xa) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000200)=0x1e) [ 208.351059] tmpfs: No value for mount option ' 3333ff00001a [ 208.351059] 36 team_slave_1 1 0 3333ffaaaa1a [ 208.351059] 36 team_slave_1 1 0 3333ffaff80e [ 208.351059] 25 veth0_to_bridge 1 0 333300000001 [ 208.351059] 25 veth0_to_bridge 1 0 3333ff00001b [ 208.351059] 25 veth0_to_bridge 1 0 01005e000001 [ 208.351059] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 208.351059] 26 bridge_slave_0 1 0 333300000001 [ 208.351059] 26 bridge_slave_0 1 0 01005e000001 14:10:29 executing program 4: ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101001, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000300)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000380)='/d\xff\xff\xff\xffnd/pcmC#D#cx', 0x12, 0x0) r2 = syz_open_pts(r1, 0x0) madvise(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xf) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f00000002c0)) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2200, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x3, 0xffffffff80000000, 0xe0000000000000}}, 0x28) sched_setaffinity(0x0, 0x241, &(0x7f0000000100)=0x2d) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x3) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000280)) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, &(0x7f0000000200)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x14) [ 208.351059] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 208.351059] 33 veth0_to_team 1 0 333300000001 [ 208.351059] 33 veth0_to_team 1 0 01005e000001 [ 208.351059] 33 veth0_to_team 1 0 3333ff00001f [ 208.351059] 33 veth0_to_team 1 0 3333ffaaaa1f [ 208.351059] 27 veth1_to_bridge 1 0 333300000001 [ 208.351059] 27 veth1_to_bridge 1 0 01005e000001 [ 208.447441] XFS (loop2): unknown mount option [subj_type=syz0]. [ 208.609026] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:10:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x80, 0x8) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x3, 0x8, 0x9, "2cecbf3dc07e973bb23eb3d40a6f5fd877169de41cde0e8f3c50a44be027dfa5e425bd3c195f8f57c43c16fd70b09802f02487e3b4e6018bebcb428b1ebe3cd5", "8827d98b3593d06170ccaf01ee8d8522f1fc63437767b13b9909c9eeab3d1744a3450143e7b51c52a83f6400cf26c3a26efb1e39dacc098a43c9797cbce9bc5f", "7d257b4fc721ccab2b64ab76a3d2be5423bac426d303305118da0d61338e8e18", [0x9, 0x100]}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0xfffffffffffffea6, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="44000009010000000058a244350836e38f5d17b74b00cdbcd4040100f5e601ed404b7610", @ANYRES32=r3, @ANYBLOB="000000000000000024001200140001006272696467655f736c617665000000000c0005000800050000000000"], 0x3}}, 0x80) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @remote}, {0x2, 0x4e21, @remote}, 0x21, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)='veth0_to_bridge\x00', 0xffff, 0x8000, 0xa9f3}) r4 = geteuid() syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x9f, 0xa, &(0x7f00000007c0)=[{&(0x7f0000000380)="ae547545991996d3117354cc2da870c2bc836dbcc21603c9feb9648a81ea390cc723023d19787ef7f100f7ef87f44becc93eae9a030d3cccdfd4d38e12093e5a02ea9ecad89a83a5e787e5418a6c4c0ceb73646c308a477c414d5264a7e4bfb931d9194a96699b9ea2aefa8a66e0cc3548fee6640d62e51d812ff75355cc737ba1087fe4a20c0658254bd363144a7e1aa4fddddc5e1e82a9d864e7e155bea5f1c27e3104221f9ff2308cf990a7b2442f652f74c9269190b3698fcf0d01cddfb73c3e23b95ede0b3941dafbfe94de461a23cdde6ef9e1534ff5c8daef6770ae84c2623d", 0xe3, 0x401}, {&(0x7f0000000200)="ccfdc98c08178f9df1e2e92db8d9f2108a09a05c31474d6dd65a3b4429a854cfa9e73af08c3a02ba9ac8175bc2f4dcc194d6770a3b5814b91d98cd6ecca2dd9b305e9e56eedecb7639da7abb1f142360f63826789da632bf3e8316b46d5a851368cb8c3f8a147700af73e1a4d601a767ebaa32e4be48950ab13254c9e86b873f4ad2446cc3fa398ed4bf6ac49d05906b9c06638bb1e68c24545e36f41e4c6e9e5ba4b766d076006023c816aca466eaf68af9c302b3a5087ea8e667eb3177", 0xbe, 0x20}, {&(0x7f0000000480)="eb2ed7a30c3bc0c7527f274b01fb913559e81520593d74f18035247b29a277a02fe19a98fffda096b9acec6215bc461cf62aa3047a87273aac805a94b1a30b880e1af0757f4e534b4cb6c3348157a36d9edc3f3b8b72eee129f41967b8137c471b2aab391f9406784ab6abd57a3c024ae7dc46d90d12cb227c7376cc8f373cd462286d4b628183eac6f57f7d5de26f2f0352e697bb0827ffc8a317a09f2753e0e9e1ccd682fdf3ae70", 0xa9, 0xfff}, {&(0x7f0000000540)="4546f3172bcdd4105b6cef672c045820b4fc53834df5082a83de", 0x1a, 0x7}, {&(0x7f0000000580)="b65cc494f4185fe8f22dca5f809032902a16c8f2db81a89afeb9516f40d8fba66efd338aa77563d606af7517113809ef62a93984dc8cc6481b1473aec03f55c97645ba364a2e324c5c9400e2f542bccd32a1", 0x52, 0x10001}, {&(0x7f0000000600)="225b433be7f3be4ad003aa042b0707139a237b15ad4ddcdf6e09906a254b572fd410aa2ebae2a50c48e4f3fffbf299b0cb6c", 0x32, 0x4}, {&(0x7f0000000640)="fbe2f7d3d1a3f63736a6fa36e47afa90050d29fdc6f8471b7144c82f96ced6edba89ed21fb8ff274e870dadf847e5f8541b6c4bf0b8574710c21e63c144f94fb38", 0x41, 0x3}, {&(0x7f00000006c0)="c1b7431c10ff2a52c3575771823b7597bbf4d931a009e8f3ec61aa8765a8477be522f0ee22c8f560e92567c8daccea5b3c702d810ed670e7f5eb50856090d4fd1fbe14494597704e05434c34d988cdc870f04cdc4a45fedaf1932096bac5f70b22c36b5eb84b14c0c4275f0bb4de0ead3d95fec08d", 0x75, 0xa3}, {&(0x7f0000000740)="7a8d074aa1f2c250eef8d422ea03", 0xe, 0x6}, {&(0x7f0000000780)="5193972435c78ea4c72dbaac", 0xc, 0x8000}], 0x10, &(0x7f00000008c0)={[{@commit={'commit', 0x3d, 0x7}}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x7}}, {@quota_off='quota=off'}, {@quota_account='quota=account'}, {@meta='meta'}, {@noacl='noacl'}, {@norecovery='norecovery'}], [{@fowner_lt={'fowner<', r4}}, {@smackfshat={'smackfshat'}}, {@subj_type={'subj_type', 0x3d, '&'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 14:10:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffffe, 0x1}, 0x328) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffff150, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0), 0x0, 0x2}], 0x800000, &(0x7f0000000240)='/dev/hwrng\x00') 14:10:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:10:29 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, &(0x7f0000000180)='tmpfs\x00') 14:10:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:29 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 208.952692] cgroup: cgroup2: unknown option "tmpfs" [ 208.968829] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 208.978938] gfs2: invalid mount option: fowner<00000000000000000000 14:10:29 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpf\x93\xd2', 0x0, &(0x7f0000000000)=',') lsetxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000300)=@v2={0x2000000, [{0x6, 0x3}, {0x7, 0xfffffffffffffffe}]}, 0x2bb, 0x4000000000201) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000180)) [ 208.997438] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 209.018346] XFS (loop2): unknown mount option [subj_type=syz0]. [ 209.041699] gfs2: can't parse mount arguments 14:10:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:10:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 209.054638] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 14:10:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 209.097304] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 209.134265] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:29 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') accept(r0, &(0x7f0000000140)=@nfc, &(0x7f0000000000)=0x80) read(r0, &(0x7f0000000040)=""/230, 0x20000346) [ 209.194224] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:29 executing program 0: r0 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x2) socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@l2, &(0x7f0000000280)=0x80, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000002c0)=0xffffff0e) ioprio_get$pid(0x2, r2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x4, {0x9}}) 14:10:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, '/dev/usbmon#\x00'}, {0x20, '/dev/usbmon#\x00'}, {0x20, '-%md5sum\'proc-posix_acl_accesskeyring'}, {0x20, '/dev/usbmon#\x00'}, {0x20, '*'}, {0x20, ']'}, {0x20, '/dev/audio#\x00'}, {0x20, 'eth0:securityem0^-ppp0'}], 0xa, "cb6b14d11135fa83dc76c10bfda56b2a1e9cebf6944e7615ad5836e405441cb3bcd69cb8555d2d5a885435cd9ed71f54319a30a79c822e31b6860a01a0dfb62ec5f68b8c3a"}, 0xc8) r1 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0) getsockopt(r1, 0x200000000114, 0x2715, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x400000) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0xf004, 0x12000}) 14:10:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:29 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x92, 0x151080) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0x5, &(0x7f00000001c0)=0x1) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) syz_open_procfs(r2, &(0x7f00000004c0)='net/if_inet6\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r3, &(0x7f0000000040)=""/230, 0xfffffffffffffe3f) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000300)=""/105, &(0x7f0000000240)=0x69) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x8, &(0x7f00000002c0)=',') mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000b6dfbfc753cd64df029bd8dfc16b16850fd11e3c7e043dd4e29f20be33d310a17b21a29d9a6fb089a64878ebe91876f66d840aca038dd3"], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='nilfs2\x00', 0xa0004, &(0x7f0000000580)='/dev/vhost-vsock\x00') 14:10:29 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:29 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x6) poll(&(0x7f0000000000)=[{r1}], 0x8, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140), 0x4) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000180)) [ 209.453819] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 14:10:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 209.495656] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 14:10:30 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') ioctl$sock_netdev_private(r0, 0x89f1, &(0x7f0000000000)) 14:10:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 209.543947] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 14:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) [ 209.618242] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 209.626709] tmpfs: No value for mount option ' 3333ff00001a [ 209.626709] 36 team_slave_1 1 0 3333ffaaaa1a [ 209.626709] 36 team_slave_1 1 0 3333ffaff80e [ 209.626709] 25 veth0_to_bridge 1 0 333300000001 [ 209.626709] 25 veth0_to_bridge 1 0 3333ff00001b [ 209.626709] 25 veth0_to_bridge 1 0 01005e000001 [ 209.626709] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 209.626709] 26 bridge_slave_0 1 0 333300000001 [ 209.626709] 26 bridge_slave_0 1 0 01005e000001 [ 209.626709] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 209.626709] 33 veth0_to_team 1 0 333300000001 [ 209.626709] 33 veth0_to_team 1 0 01005e000001 [ 209.626709] 33 veth0_to_team 1 0 3333ff00001f [ 209.626709] 33 veth0_to_team 1 0 3333ffaaaa1f [ 209.626709] 27 veth1_to_bridge 1 0 333300000001 [ 209.626709] 27 veth1_to_bridge 1 0 01005e000001 14:10:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:30 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 209.726586] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:30 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 209.867820] tmpfs: No value for mount option ' 3333ff00001a [ 209.867820] 36 team_slave_1 1 0 3333ffaaaa1a [ 209.867820] 36 team_slave_1 1 0 3333ffaff80e [ 209.867820] 25 veth0_to_bridge 1 0 333300000001 [ 209.867820] 25 veth0_to_bridge 1 0 3333ff00001b [ 209.867820] 25 veth0_to_bridge 1 0 01005e000001 [ 209.867820] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 209.867820] 26 bridge_slave_0 1 0 333300000001 [ 209.867820] 26 bridge_slave_0 1 0 01005e000001 14:10:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 209.867820] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 209.867820] 33 veth0_to_team 1 0 333300000001 [ 209.867820] 33 veth0_to_team 1 0 01005e000001 [ 209.867820] 33 veth0_to_team 1 0 3333ff00001f [ 209.867820] 33 veth0_to_team 1 0 3333ffaaaa1f [ 209.867820] 27 veth1_to_bridge 1 0 333300000001 [ 209.867820] 27 veth1_to_bridge 1 0 01005e000001 14:10:30 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:30 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-monitor\x00', 0x80400, 0x0) renameat(r0, &(0x7f00000009c0)='./file0\x00', r1, &(0x7f0000000a40)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000800)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x6, &(0x7f0000000740)=[{&(0x7f0000000200)="996734108a18cf82c5d2253ad5a1ed4310880b7313517f7778f761bc6d365b2c140d7c984a7464df", 0x28, 0x18000}, {&(0x7f00000002c0)="11cc2e83460c7b41f5111bb8014d9f41417da31180588bcf3d8a6f910b7348c8e5a7b5935162a72f2be101199e46166918b5c0d1844a2c24cc54b08ee97ebbfc9928cac936b8034335c27070e518870d2c075927e18058afa1deb1374c17fa94b5f8912711d6734d86ae2603518d445b244b4aa947b21067fab824f70903ac3addb326635b0e21616ea7ce059132bb369b96eb15cda2f4d2fa5bb1", 0x9b, 0x8}, {&(0x7f0000000380)="625716a4f6cad942f191d45552e073002033df9d349303545cad91bbe6db9140f3989c94bac256391b4a511175827033ef85dd5a29993951deab47d0531531285d8faecf90b0141b6d9da092f96598a645ae59c4dea8bea6bd48455cee5ee750869753ae04ce110e07c62dd0b19d59ef72dae00ed974c89ec2eb81ead9e1c1e32c8c02987d8ab021eafe26471fd413bf494d", 0x92, 0x50}, {&(0x7f0000000240)="21733d87b5dc553b2075899be7069ea2c0bcf38a01ae96ea9fc84a5784ded6f4690659db1e3bae4a62", 0x29, 0x5bf}, {&(0x7f0000000540)="4ead76ccba30f36f28f263443df3d9078a8d615a8d28d3f6111887e1106dff4efda143ec2bfaee4a4dcf1d009644e89bf662eab97aaca590abda1d1c9586653f5a7e116795eb8796ea9775c4a275d07483109a8fe468447c0cef3e752487296be6e443806b375f6762e6e484f95b3b01d99dfa9878a3b6d717532ab37cc811cd0e6ddb0f85bb15deaa8c08a680cc892faf9ce43dd3c6a8b650bbeb1e8f003ce7e5e89fa504d88db4fe8c08daf87df33ee0d561aff81863929d15b36c2eaa844015d16d445c855e50afeb", 0xca, 0x6d9e}, {&(0x7f0000000640)="25048b4ee0a58129563580ba20ff50ba1b2d706abbf239befc5bcebfb885f5a265e0be5c723cdf2494aa48d77e30bc07d63250cb003f686b36b298720441c72f61601e502a0b018a545cf1bd4b5fe6a4b94ca04bc1a77060cc6a9876c76b79a42e3d230dbe3f03191e5115a35089cb39d25c466f5d1269348f1b1b37eba6223d09380e44119ac752e7d1f5c0cebae142f5cf3e3530e74778d0c2061f0c489e8f8c98ce0e31eb76b7b591d698c5b2c73a6d76b033c8d12a09eb04535f71c4f2b47c85ee209b1ddcfcd2adfd2fcf", 0xcd, 0x1}], 0x8c000, &(0x7f0000000900)={[{@noquota='noquota'}, {@background_gc_sync='background_gc=sync'}], [{@euid_gt={'euid>', r3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x66, 0x77, 0x39, 0x7f, 0x71, 0x77, 0x63], 0x2d, [0x61, 0x62, 0x77, 0x66], 0x2d, [0x61, 0x37, 0x33, 0x3b], 0x2d, [0x37, 0x37, 0x31, 0x77], 0x2d, [0x77, 0x33, 0x66, 0x7f, 0x31, 0x30, 0x37]}}}]}) read(r2, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:30 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5eb, 0x102) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000240)={0x0, 0x401, 0x0, &(0x7f0000000200)=0xe524}) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x200000020, &(0x7f0000000000), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='caif0\x00', 0x10) setsockopt$sock_int(r3, 0x1, 0x13, &(0x7f0000000040)=0x8001, 0x4) mq_getsetattr(r1, &(0x7f0000000180)={0x40, 0x0, 0x40, 0xff, 0x6, 0x6, 0x80000000, 0x7}, &(0x7f00000001c0)) 14:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 14:10:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:30 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0x28) 14:10:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:30 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 210.346461] tmpfs: No value for mount option ' 3333ff00001a [ 210.346461] 36 team_slave_1 1 0 3333ffaaaa1a [ 210.346461] 36 team_slave_1 1 0 3333ffaff80e [ 210.346461] 25 veth0_to_bridge 1 0 333300000001 [ 210.346461] 25 veth0_to_bridge 1 0 3333ff00001b [ 210.346461] 25 veth0_to_bridge 1 0 01005e000001 [ 210.346461] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 210.346461] 26 bridge_slave_0 1 0 333300000001 [ 210.346461] 26 bridge_slave_0 1 0 01005e000001 14:10:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x402}, 0x28) 14:10:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) prctl$PR_GET_NO_NEW_PRIVS(0x27) syz_open_dev$vbi(0x0, 0x2, 0x2) [ 210.346461] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 210.346461] 33 veth0_to_team 1 0 333300000001 [ 210.346461] 33 veth0_to_team 1 0 01005e000001 [ 210.346461] 33 veth0_to_team 1 0 3333ff00001f [ 210.346461] 33 veth0_to_team 1 0 3333ffaaaa1f [ 210.346461] 27 veth1_to_bridge 1 0 333300000001 [ 210.346461] 27 veth1_to_bridge 1 0 01005e000001 14:10:31 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:31 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpta\x00', 0x0, &(0x7f00000001c0)=',') 14:10:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) prctl$PR_GET_NO_NEW_PRIVS(0x27) syz_open_dev$vbi(0x0, 0x2, 0x2) 14:10:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x402}, 0x28) 14:10:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x402}, 0x28) 14:10:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x400208043, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="f3f4460f01d10f08f346fd66b853000f00d066b80b000f00d80f215266470f6e65db4381d4490000000f20e3", 0x2c}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/igmp\x00') perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x1ff, 0x80, 0x7, 0x6, 0x0, 0x8a7, 0x2004, 0x8, 0xffffffff, 0x2, 0x0, 0xffffffffffffff00, 0x7, 0x8000, 0x2, 0x6d, 0x2f51, 0x3, 0x1, 0x5, 0x92, 0x5, 0x33bb, 0xc41, 0x1ff, 0xffff, 0x3870, 0x61, 0x100000000, 0x3, 0x1, 0x1, 0x6, 0xffffffffffffff7f, 0x100000000, 0x2, 0x0, 0x800, 0x6, @perf_bp={&(0x7f0000000000), 0x3}, 0x200, 0x0, 0x9, 0xb, 0x6, 0x2, 0x96}, r3, 0x9, r4, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:10:31 executing program 3: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f00000003c0)=r1, 0x12) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') bind$can_raw(r2, &(0x7f00000002c0), 0x10) read(r2, &(0x7f0000000040)=""/230, 0x20000346) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) open$dir(&(0x7f0000000300)='./file0\x00', 0x8107a01, 0x0) syz_open_procfs(r3, &(0x7f0000000200)='mountinfo\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x100, 0x0) 14:10:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="14a881c95cb11ad0013697f7f08b0d29ccae4907d33bf37907de910ad6464dd1fddc6802a7a46a4b661625d7f599d7dd3ccb6501841bf6af513583700589d47dda658304b7b79408ea6971bd57c24bae79f8190f1fbda5a7c7cc82f8c70b51900bf18ccfa0cceae56d3b80aca0d469c6a466f8cdb47cb0f18e54afc35d3ecab60911d2d376146e09a4d15afddf33a1ebe25f0a49c4089ca10ff014430433bf2e26b5c7a5f550a8d7180ed5fe511da0b4f7fc13323465fadfe2f237c5ba0068a1128131129ef09982d38c92fa03d9f133daec1b23cbad81be9ca13059f0", 0xdd, 0x26}], 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 210.775228] XFS (loop2): unknown mount option [subj_type=syz0]. [ 210.817461] tmpfs: No value for mount option ' 3333ff00001a [ 210.817461] 36 team_slave_1 1 0 3333ffaaaa1a [ 210.817461] 36 team_slave_1 1 0 3333ffaff80e [ 210.817461] 25 veth0_to_bridge 1 0 333300000001 [ 210.817461] 25 veth0_to_bridge 1 0 3333ff00001b [ 210.817461] 25 veth0_to_bridge 1 0 01005e000001 [ 210.817461] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 210.817461] 26 bridge_slave_0 1 0 333300000001 [ 210.817461] 26 bridge_slave_0 1 0 01005e000001 [ 210.817461] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 210.817461] 33 veth0_to_team 1 0 333300000001 [ 210.817461] 33 veth0_to_team 1 0 01005e000001 [ 210.817461] 33 veth0_to_team 1 0 3333ff00001f [ 210.817461] 33 veth0_to_team 1 0 3333ffaaaa1f [ 210.817461] 27 veth1_to_bridge 1 0 333300000001 [ 210.817461] 27 veth1_to_bridge 1 0 01005e000001 [ 211.026263] device bridge_slave_1 left promiscuous mode [ 211.043777] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.091823] tmpfs: No value for mount option ' 3333ff00001a [ 211.091823] 36 team_slave_1 1 0 3333ffaaaa1a [ 211.091823] 36 team_slave_1 1 0 3333ffaff80e [ 211.091823] 25 veth0_to_bridge 1 0 333300000001 [ 211.091823] 25 veth0_to_bridge 1 0 3333ff00001b [ 211.091823] 25 veth0_to_bridge 1 0 01005e000001 [ 211.091823] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 211.091823] 26 bridge_slave_0 1 0 333300000001 [ 211.091823] 26 bridge_slave_0 1 0 01005e000001 [ 211.091823] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 211.091823] 33 veth0_to_team 1 0 333300000001 [ 211.091823] 33 veth0_to_team 1 0 01005e000001 [ 211.091823] 33 veth0_to_team 1 0 3333ff00001f [ 211.091823] 33 veth0_to_team 1 0 3333ffaaaa1f [ 211.091823] 27 veth1_to_bridge 1 0 333300000001 [ 211.091823] 27 veth1_to_bridge 1 0 01005e000001 [ 211.187836] device bridge_slave_0 left promiscuous mode [ 211.203556] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.329240] bond1 (unregistering): Released all slaves [ 211.392179] device hsr_slave_1 left promiscuous mode [ 211.443684] device hsr_slave_0 left promiscuous mode [ 211.485063] team0 (unregistering): Port device team_slave_1 removed [ 211.503284] team0 (unregistering): Port device team_slave_0 removed [ 211.539163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 211.604700] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 211.716147] bond0 (unregistering): Released all slaves [ 213.491384] IPVS: ftp: loaded support on port[0] = 21 [ 214.401549] IPVS: ftp: loaded support on port[0] = 21 [ 214.415330] chnl_net:caif_netlink_parms(): no params data found [ 214.476918] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.484036] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.491033] device bridge_slave_0 entered promiscuous mode [ 214.497902] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.504564] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.511526] device bridge_slave_1 entered promiscuous mode [ 214.531767] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.545687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.594901] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.602385] team0: Port device team_slave_0 added [ 214.627910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.635130] team0: Port device team_slave_1 added [ 214.640633] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.650282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.734857] device hsr_slave_0 entered promiscuous mode [ 214.790635] device hsr_slave_1 entered promiscuous mode [ 214.850437] chnl_net:caif_netlink_parms(): no params data found [ 214.858945] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 214.866476] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 214.909916] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.916344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.922991] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.929354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.941305] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.947674] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.955135] device bridge_slave_0 entered promiscuous mode [ 214.965522] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.972310] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.979234] device bridge_slave_1 entered promiscuous mode [ 214.998680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.015038] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.036782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.044138] team0: Port device team_slave_0 added [ 215.049837] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.058260] team0: Port device team_slave_1 added [ 215.067665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.075682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.134342] device hsr_slave_0 entered promiscuous mode [ 215.170572] device hsr_slave_1 entered promiscuous mode [ 215.239232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 215.247112] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 215.266503] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.272904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.279494] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.285899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.296112] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 215.302324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.314822] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.325866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.333377] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.340222] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.347845] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.354973] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.371474] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 215.377607] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.393750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.403824] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 215.414150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.422952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.432594] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.438782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.446779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.454472] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.460878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.468782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.476365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.484624] device bridge_slave_1 left promiscuous mode [ 215.490271] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.541257] device bridge_slave_0 left promiscuous mode [ 215.546758] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.626790] bond1 (unregistering): Released all slaves [ 215.671782] device hsr_slave_1 left promiscuous mode [ 215.724267] device hsr_slave_0 left promiscuous mode [ 215.765499] team0 (unregistering): Port device team_slave_1 removed [ 215.774822] team0 (unregistering): Port device team_slave_0 removed [ 215.786944] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 215.814936] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 215.872006] bond0 (unregistering): Released all slaves [ 215.935401] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 215.941723] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.948991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.959995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.967101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.975463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.983269] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.989638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.996553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.006866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.017226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.024450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.032628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.040311] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.046654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.053778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.063679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.071872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.079656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.087414] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.093817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.105086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.112658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.120889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.131008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.137901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.145425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.158521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.168181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 216.176567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.184761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.194743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.202472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.211212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.219132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 216.228003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.235724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.244058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.251652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.259204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.267304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.275071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.284725] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 216.290992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.303345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.313465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.321610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.371396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 216.378552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.386748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.397234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 216.406168] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.416744] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 216.423695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.435201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.450701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.458710] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 216.478107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.498497] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 216.515549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.658486] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.667332] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.674389] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.681257] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.689150] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 217.737960] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.753994] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.765811] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.776053] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.788683] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:38 executing program 5: symlink(&(0x7f0000000300)='..', &(0x7f00000003c0)='./file0\x00') r0 = socket$inet(0xa, 0x801, 0x84) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x400000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000280)={{0xfffffffffffff224}, 'port1\x00', 0x4, 0x0, 0x9b, 0x2, 0x4, 0x9, 0x3, 0x0, 0x1, 0x81}) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r2 = accept4(r0, 0x0, 0x0, 0x80800) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xfffffffffffffffc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in6, @in6=@dev}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000016c0)=0xe8) fstat(r4, &(0x7f0000001700)) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000019c0)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getgid() stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f0000001e40)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000043c0)) geteuid() fstat(r2, &(0x7f0000004400)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004480)) getresgid(&(0x7f00000006c0), &(0x7f0000000680), &(0x7f0000000640)) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000004840)) 14:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0302000d69", 0x0, 0x402}, 0x28) 14:10:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:38 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') mknod$loop(&(0x7f0000000000)='./file0\x00', 0xc000, 0x0) 14:10:38 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:38 executing program 4: syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200400, 0x0) [ 217.889020] tmpfs: No value for mount option ' 3333ff00001a [ 217.889020] 36 team_slave_1 1 0 3333ffaaaa1a [ 217.889020] 36 team_slave_1 1 0 3333ffaff80e [ 217.889020] 25 veth0_to_bridge 1 0 333300000001 [ 217.889020] 25 veth0_to_bridge 1 0 3333ff00001b [ 217.889020] 25 veth0_to_bridge 1 0 01005e000001 [ 217.889020] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 217.889020] 26 bridge_slave_0 1 0 333300000001 [ 217.889020] 26 bridge_slave_0 1 0 01005e000001 [ 217.889020] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 217.889020] 33 veth0_to_team 1 0 333300000001 [ 217.889020] 33 veth0_to_team 1 0 01005e000001 [ 217.889020] 33 veth0_to_team 1 0 3333ff00001f [ 217.889020] 33 veth0_to_team 1 0 3333ffaaaa1f [ 217.889020] 27 veth1_to_bridge 1 0 333300000001 [ 217.889020] 27 veth1_to_bridge 1 0 01005e000001 14:10:38 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0302000d69", 0x0, 0x402}, 0x28) [ 217.996824] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0302000d69", 0x0, 0x402}, 0x28) 14:10:38 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:38 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40", 0x0, 0x402}, 0x28) [ 218.205726] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:38 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 218.266862] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 218.281596] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 218.339905] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 218.364301] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 218.380714] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40", 0x0, 0x402}, 0x28) 14:10:39 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 218.395099] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}, {@largeio='largeio'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:39 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40", 0x0, 0x402}, 0x28) 14:10:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x8, [0xfffffffffffffffd, 0x6efa, 0x401, 0x8001, 0x5, 0x8, 0x2, 0x800]}, &(0x7f0000000080)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 14:10:39 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair(0x1, 0x80000, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e22, 0x30, @remote, 0x6a05}, {0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x20, [0x7fffffff, 0x5, 0x8, 0x7fff, 0x9, 0x0, 0x2, 0x3]}, 0x5c) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 218.577656] XFS (loop2): unknown mount option [subj_type=syz0]. [ 218.643677] tmpfs: No value for mount option ' 3333ff00001a [ 218.643677] 36 team_slave_1 1 0 3333ffaaaa1a [ 218.643677] 36 team_slave_1 1 0 3333ffaff80e [ 218.643677] 25 veth0_to_bridge 1 0 333300000001 [ 218.643677] 25 veth0_to_bridge 1 0 3333ff00001b [ 218.643677] 25 veth0_to_bridge 1 0 01005e000001 [ 218.643677] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 218.643677] 26 bridge_slave_0 1 0 333300000001 [ 218.643677] 26 bridge_slave_0 1 0 01005e000001 14:10:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 14:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02c", 0x0, 0x402}, 0x28) [ 218.643677] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 218.643677] 33 veth0_to_team 1 0 333300000001 [ 218.643677] 33 veth0_to_team 1 0 01005e000001 [ 218.643677] 33 veth0_to_team 1 0 3333ff00001f [ 218.643677] 33 veth0_to_team 1 0 3333ffaaaa1f [ 218.643677] 27 veth1_to_bridge 1 0 333300000001 [ 218.643677] 27 veth1_to_bridge 1 0 01005e000001 14:10:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x311, 0x0, 0x0, {}, [@RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x8}}]}, 0x30}}, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) accept$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c) [ 218.836225] XFS (loop2): Invalid superblock magic number [ 219.110989] device bridge_slave_1 left promiscuous mode [ 219.116575] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.170892] device bridge_slave_0 left promiscuous mode [ 219.176590] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.313009] device hsr_slave_1 left promiscuous mode [ 219.354301] device hsr_slave_0 left promiscuous mode [ 219.393930] team0 (unregistering): Port device team_slave_1 removed [ 219.425796] team0 (unregistering): Port device team_slave_0 removed [ 219.451872] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 219.514786] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 219.646466] bond0 (unregistering): Released all slaves [ 221.391377] IPVS: ftp: loaded support on port[0] = 21 [ 222.293455] IPVS: ftp: loaded support on port[0] = 21 [ 222.314516] chnl_net:caif_netlink_parms(): no params data found [ 222.368217] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.374692] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.381648] device bridge_slave_0 entered promiscuous mode [ 222.388354] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.394971] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.401928] device bridge_slave_1 entered promiscuous mode [ 222.419730] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.428581] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.449259] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.456639] team0: Port device team_slave_0 added [ 222.465687] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.473970] team0: Port device team_slave_1 added [ 222.486429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.495519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.592220] device hsr_slave_0 entered promiscuous mode [ 222.630521] device hsr_slave_1 entered promiscuous mode [ 222.682771] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.689661] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.699769] chnl_net:caif_netlink_parms(): no params data found [ 222.730975] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.737347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.743986] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.750366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.769548] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.776681] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.784266] device bridge_slave_0 entered promiscuous mode [ 222.795007] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.801509] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.808377] device bridge_slave_1 entered promiscuous mode [ 222.828160] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.837567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.857979] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.865266] team0: Port device team_slave_0 added [ 222.870869] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.877872] team0: Port device team_slave_1 added [ 222.888353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.895815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.953664] device hsr_slave_0 entered promiscuous mode [ 222.990432] device hsr_slave_1 entered promiscuous mode [ 223.031104] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.042834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.058784] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.065167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.071797] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.078124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.104377] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 223.110991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.120510] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.132881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.139788] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.147018] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.154190] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.161286] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.169972] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.176338] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.191649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.199187] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.205552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.224426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.232137] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.238522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.246234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.253852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.263110] device bridge_slave_1 left promiscuous mode [ 223.268569] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.321103] device bridge_slave_0 left promiscuous mode [ 223.326591] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.424577] device hsr_slave_1 left promiscuous mode [ 223.463898] device hsr_slave_0 left promiscuous mode [ 223.504246] team0 (unregistering): Port device team_slave_1 removed [ 223.514131] team0 (unregistering): Port device team_slave_0 removed [ 223.524343] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 223.565169] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 223.622088] bond0 (unregistering): Released all slaves [ 223.685295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.693141] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 223.703349] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.714244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.723256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.731102] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.738093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.746188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.753747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.760705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.769979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.778689] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.784844] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.791216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.798993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.807936] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.814460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.823550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.835138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.843393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.851039] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.857372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.866881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.874274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.882121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.889677] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.896041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.908115] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.916874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.926895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.937730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.947432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.955435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.963430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.971163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.978629] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.987669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.996323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.006723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.014748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.064866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 224.073126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.082816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.095691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.104810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.115865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.126904] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.137879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.167592] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.194932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.589276] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 224.596468] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 224.604588] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 224.611716] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 224.619286] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02c", 0x0, 0x402}, 0x28) 14:10:45 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x25a0c1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0xba, 0x2b5}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}}}, &(0x7f0000000200)=0x84) fgetxattr(0xffffffffffffffff, &(0x7f0000000340)=@known='com.apple.FinderInfo\x00', &(0x7f0000000540)=""/212, 0xd4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x4000004000, 0x0) eventfd(0x80004d) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) read(r3, 0x0, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000300)=0x979) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1=0xe0000506, 0x0, 0x0, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105517, &(0x7f0000000500)) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000440)={0x5, 0x1, 0x7, 0x1000, 0x7fff}) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000002c0)=0x2) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x412040, 0x8) connect$rxrpc(r5, &(0x7f0000000280)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x100000001, @mcast1, 0x100}}, 0x5) clock_gettime(0x6, &(0x7f0000000200)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000003c0)={0x0, 0x0, 0xfffffffffffffd44, 0x1000900, {r6, r7/1000+30000}, {0x5, 0x0, 0x1, 0xd, 0x9, 0x6, "228c6e58"}, 0x5, 0x6, @fd, 0xfffffda9}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x20000000) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x39, 0x0) r8 = socket$inet(0x10, 0x2000000000000002, 0x0) setsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000380)=0x1, 0x4) sendmsg(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000780)="2f0000001c0005c5ffffff000d000c000200001f01000000fc0002c9130001000300000050000000586700a286ef1e6dd4bcd963b36241e8a75954c8078a3f9644fbabccf7574870a0745e1e5851d39e491cdb29200f29a365f5e23bfb31a092da746544ed6585a0e7f16491d4fc", 0x6e}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000240)="9296089ee4daa0c304064f9879733c25db0116321ed8eac64466ff881f0ba9971548fee01db1e495963f496a24d8896748bb35", 0x33) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r9, 0x40096101, &(0x7f00000000c0)) 14:10:45 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x5, 0x1, 0xfff, 0x4, 0x4, 0x1, 0x7, 0x3, 0x610, 0x2, 0xfffffffffffffff9, 0x405}) 14:10:45 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) [ 224.720901] tmpfs: No value for mount option ' 3333ff00001a [ 224.720901] 36 team_slave_1 1 0 3333ffaaaa1a [ 224.720901] 36 team_slave_1 1 0 3333ffaff80e [ 224.720901] 25 veth0_to_bridge 1 0 333300000001 [ 224.720901] 25 veth0_to_bridge 1 0 3333ff00001b [ 224.720901] 25 veth0_to_bridge 1 0 01005e000001 [ 224.720901] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 224.720901] 26 bridge_slave_0 1 0 333300000001 [ 224.720901] 26 bridge_slave_0 1 0 01005e000001 14:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02c", 0x0, 0x402}, 0x28) [ 224.720901] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 224.720901] 33 veth0_to_team 1 0 333300000001 [ 224.720901] 33 veth0_to_team 1 0 01005e000001 [ 224.720901] 33 veth0_to_team 1 0 3333ff00001f [ 224.720901] 33 veth0_to_team 1 0 3333ffaaaa1f [ 224.720901] 27 veth1_to_bridge 1 0 333300000001 [ 224.720901] 27 veth1_to_bridge 1 0 01005e000001 14:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:45 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 224.838740] tmpfs: No value for mount option ' 3333ff00001a [ 224.838740] 36 team_slave_1 1 0 3333ffaaaa1a [ 224.838740] 36 team_slave_1 1 0 3333ffaff80e [ 224.838740] 25 veth0_to_bridgenet/dev_mcast' [ 224.874128] XFS (loop2): Invalid superblock magic number 14:10:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 14:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:45 executing program 3: umount2(&(0x7f0000000340)='./file0\x00', 0x5) mount$9p_virtio(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x4a2, &(0x7f00000002c0)={'trans=virtio,', {[{@noextend='noextend'}, {@access_any='access=any'}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, 'net/dev_mcast\x00'}}, {@afid={'afid', 0x3d, 0x9}}]}}) mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='net/dev_mcast\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000500)='net/dev_mcast\x00') syz_mount_image$minix(&(0x7f00000003c0)='minix\x00', &(0x7f0000000400)='./file0\x00', 0x3, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000440), 0x0, 0x669b}, {&(0x7f0000000800)="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", 0x1000, 0x9}], 0x2084000, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000380)={'rose0\x00', {0x2, 0x4e23, @empty}}) read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 225.139398] tmpfs: No value for mount option ' 3333ff00001a [ 225.139398] 36 team_slave_1 1 0 3333ffaaaa1a [ 225.139398] 36 team_slave_1 1 0 3333ffaff80e [ 225.139398] 25 veth0_to_bridge 1 0 333300000001 [ 225.139398] 25 veth0_to_bridge 1 0 3333ff00001b [ 225.139398] 25 veth0_to_bridge 1 0 01005e000001 [ 225.139398] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 225.139398] 26 bridge_slave_0 1 0 333300000001 [ 225.139398] 26 bridge_slave_0 1 0 01005e000001 [ 225.139398] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 225.139398] 33 veth0_to_team 1 0 333300000001 [ 225.139398] 33 veth0_to_team 1 0 01005e000001 [ 225.139398] 33 veth0_to_team 1 0 3333ff00001f [ 225.139398] 33 veth0_to_team 1 0 3333ffaaaa1f [ 225.139398] 27 veth1_to_bridge 1 0 333300000001 [ 225.139398] 27 veth1_to_bridge 1 0 01005e000001 [ 225.233536] XFS (loop2): Invalid superblock magic number [ 225.239404] tmpfs: No value for mount option ' 3333ff00001a [ 225.239404] 36 team_slave_1 1 0 3333ffaaaa1a [ 225.239404] 36@' 14:10:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:46 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:46 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:46 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0xfffffcf6) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x1, 0x8) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 225.425733] IPv6: NLM_F_REPLACE set, but no existing node found! [ 225.495618] tmpfs: No value for mount option ' 3333ff00001a [ 225.495618] 36 team_slave_1 1 0 3333ffaaaa1a [ 225.495618] 36 team_slave_1 1 0 3333ffaff80e [ 225.495618] 25 veth0_to_bridge 1 0 333300000001 [ 225.495618] 25 veth0_to_bridge 1 0 3333ff00001b [ 225.495618] 25 veth0_to_bridge 1 0 01005e000001 [ 225.495618] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 225.495618] 26 bridge_slave_0 1 0 333300000001 [ 225.495618] 26 bridge_slave_0 1 0 01005e000001 [ 225.495618] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 225.495618] 33 veth0_to_team 1 0 333300000001 [ 225.495618] 33 veth0_to_team 1 0 01005e000001 [ 225.495618] 33 veth0_to_team 1 0 3333ff00001f [ 225.495618] 33 veth0_to_team 1 0 3333ffaaaa1f [ 225.495618] 27 veth1_to_bridge 1 0 333300000001 [ 225.495618] 27 veth1_to_bridge 1 0 01005e000001 [ 225.589865] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:46 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) open(0x0, 0x200c2, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 225.744324] XFS (loop2): unknown mount option [subj_type=syz0]. 14:10:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) [ 225.844364] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 225.861144] tmpfs: No value for mount option ' 3333ff00001a [ 225.861144] 36 team_slave_1 1 0 3333ffaaaa1a [ 225.861144] 36 team_slave_1 1 0 3333ffaff80e [ 225.861144] 25 veth0_to_bridge 1 0 333300000001 [ 225.861144] 25 veth0_to_bridge 1 0 3333ff00001b [ 225.861144] 25 veth0_to_bridge 1 0 01005e000001 [ 225.861144] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 225.861144] 26 bridge_slave_0 1 0 333300000001 [ 225.861144] 26 bridge_slave_0 1 0 01005e000001 [ 225.861144] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 225.861144] 33 veth0_to_team 1 0 333300000001 [ 225.861144] 33 veth0_to_team 1 0 01005e000001 [ 225.861144] 33 veth0_to_team 1 0 3333ff00001f [ 225.861144] 33 veth0_to_team 1 0 3333ffaaaa1f [ 225.861144] 27 veth1_to_bridge 1 0 333300000001 14:10:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 225.861144] 27 veth1_to_bridge 1 0 01005e000001 [ 225.951555] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 225.980531] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 225.996090] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 226.004603] XFS (loop2): unknown mount option [subj_type=syz0]. [ 226.023672] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@swalloc='swalloc'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:46 executing program 1 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 226.114039] XFS (loop2): unknown mount option [subj_type=syz0]. [ 226.920413] device bridge_slave_1 left promiscuous mode [ 226.925897] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.970945] device bridge_slave_0 left promiscuous mode [ 226.976439] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.114764] device hsr_slave_1 left promiscuous mode [ 227.154149] device hsr_slave_0 left promiscuous mode [ 227.194724] team0 (unregistering): Port device team_slave_1 removed [ 227.204292] team0 (unregistering): Port device team_slave_0 removed [ 227.214609] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 227.243542] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 227.322678] bond0 (unregistering): Released all slaves [ 229.000814] IPVS: ftp: loaded support on port[0] = 21 [ 229.890385] chnl_net:caif_netlink_parms(): no params data found [ 229.891410] IPVS: ftp: loaded support on port[0] = 21 [ 229.933777] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.940735] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.947512] device bridge_slave_0 entered promiscuous mode [ 229.964474] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.970915] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.977691] device bridge_slave_1 entered promiscuous mode [ 230.000570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.011461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.036107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.043471] team0: Port device team_slave_0 added [ 230.049083] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.056267] team0: Port device team_slave_1 added [ 230.061846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.069327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.132178] device hsr_slave_0 entered promiscuous mode [ 230.170345] device hsr_slave_1 entered promiscuous mode [ 230.250632] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 230.259819] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.308749] chnl_net:caif_netlink_parms(): no params data found [ 230.325195] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.331672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.338220] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.344582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.376916] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.384180] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.391259] device bridge_slave_0 entered promiscuous mode [ 230.405573] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.412201] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.419034] device bridge_slave_1 entered promiscuous mode [ 230.438455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.447477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.469815] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.477093] team0: Port device team_slave_0 added [ 230.482760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.489767] team0: Port device team_slave_1 added [ 230.495397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.502784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.511249] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 230.517471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.527158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.572103] device hsr_slave_0 entered promiscuous mode [ 230.620365] device hsr_slave_1 entered promiscuous mode [ 230.660843] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 230.668894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.678316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.685343] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.692486] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.702723] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 230.708788] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.723592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.731839] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.738153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.745076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.752779] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.759215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.777185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.791565] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.798462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.806729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.814472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.823475] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.833421] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 230.839426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.856643] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 230.869877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.885770] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 230.914185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.924088] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.933889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.939983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.947404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.956031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 230.962737] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.971867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.978890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.987526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.995691] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.002097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.009108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.018899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.026747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.035870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.055399] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.061809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.069269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.076466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.081194] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 231.092654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.097126] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 231.105718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.108473] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 231.116418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.120747] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 231.130722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.146306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.148688] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 [ 231.157643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.179379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 231.188335] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.201274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:10:51 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 231.209802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.223180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.233042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.244926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.252348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.259767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.268744] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.275467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.288965] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.302352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.934632] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 231.943483] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 231.950595] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 231.957276] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 231.966225] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@bsdgroups='bsdgroups'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:52 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x400000000402, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e21, @multicast2}}, 0x5, 0x1000000000, 0x9, 0x8, 0x8}, &(0x7f0000000240)=0x98) 14:10:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x3, 0x4) 14:10:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0}, 0x28) 14:10:52 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 232.112241] XFS (loop2): unknown mount option [subj_type=syz0]. [ 232.123227] tmpfs: No value for mount option ' 3333ff00001a [ 232.123227] 36 team_slave_1 1 0 3333ffaaaa1a [ 232.123227] 36 team_slave_1 1 0 3333ffaff80e [ 232.123227] 25 veth0_to_bridge 1 0 333300000001 [ 232.123227] 25 veth0_to_bridge 1 0 3333ff00001b [ 232.123227] 25 veth0_to_bridge 1 0 01005e000001 [ 232.123227] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 232.123227] 26 bridge_slave_0 1 0 333300000001 [ 232.123227] 26 bridge_slave_0 1 0 01005e000001 [ 232.123227] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 232.123227] 33 veth0_to_team 1 0 333300000001 [ 232.123227] 33 veth0_to_team 1 0 01005e000001 [ 232.123227] 33 veth0_to_team 1 0 3333ff00001f [ 232.123227] 33 veth0_to_team 1 0 3333ffaaaa1f [ 232.123227] 27 veth1_to_bridge 1 0 333300000001 14:10:52 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 232.123227] 27 veth1_to_bridge 1 0 01005e000001 [ 232.226250] device bridge_slave_1 left promiscuous mode [ 232.238975] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.252990] tmpfs: No value for mount option ' 3333ff00001a 14:10:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x1, 0x755, 0xab, 0x8}) 14:10:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:52 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 232.252990] 36 team_slave_1 1 0 3333ffaaaa1a [ 232.252990] 36 team_slave_1 1 0 3333ffaff80e [ 232.252990] 25 veth0_to_bridge 1 0 333300000001 [ 232.252990] 25 veth0_to_bridge 1 0 3333ff00001b [ 232.252990] 25 veth0_to_bridge 1 0 01005e000001 [ 232.252990] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 232.252990] 26 bridge_slave_0 1 0 333300000001 [ 232.252990] 26 bridge_slave_0 1 0 01005e000001 [ 232.252990] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 232.252990] 33 veth0_to_team 1 0 333300000001 [ 232.252990] 33 veth0_to_team 1 0 01005e000001 [ 232.252990] 33 veth0_to_team 1 0 3333ff00001f [ 232.252990] 33 veth0_to_team 1 0 3333ffaaaa1f [ 232.252990] 27 veth1_to_bridge 1 0 333300000001 [ 232.252990] 27 veth1_to_bridge 1 0 01005e000001 [ 232.360715] XFS (loop2): unknown mount option [subj_type=syz0]. [ 232.367079] device bridge_slave_0 left promiscuous mode [ 232.373014] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.409642] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 232.430817] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 14:10:53 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000100)={r1, &(0x7f0000000900)=""/4096}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)={0x77, 0x7d, 0x2, {{0x0, 0x51, 0x53, 0x401, {0x4, 0x4, 0x3}, 0x42000000, 0x5bf4, 0x10000, 0x4787, 0x7, '.-]bdev', 0x0, '', 0x0, '', 0x17, 'userem1#\':GPLsystemuser'}, 0x11, '/dev/dlm-control\x00', r2, r3, r4}}, 0x77) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000280)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ff060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf94d7ab8dabeedd7e34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r5, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:53 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f00000002c0)=""/230, 0xb4720582ab329ba0) inotify_init() write$tun(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="03070400ffff01000200ffff101e0811ffffffff46c4a2db0efa000100000000a494d1dd08891000e8598b12353da9b5d1919d88cb74a7061163158bc6a035ca6c2a0d6209b99ff0f671a83cd215314bab6089ec183870e451e841930b302ce1601b105c56bf4c39d54de9cd40377389ef7b4e8698658be6d80e9bdf196583e0cf5a660fcccac49a5fbc89202fea61d27f7d6d67776bd418b8468be914cab9f5b0c922b67ef19f2c6e098ab1d787bef8d78888e2f8d0159ab0c12b06246ad067a536bc4bfbafeefc9141772f0082f6aa2cae1860befce147145f63b2d17146f11aebcd41ba59527295ae3fa999b90dce844a544103593378c4e23711015f8ba45cda6008c04e0d3ed8b916c7740b5dfe55977acb77f8e3fef76b8d31512bafa379769e50a5dbd563a8ef5dc53d5f97c9ff9db8856baa3eda89be86d74eef379aba80e2e40920a72c53d554fee4a4d76712fa96b4eef109b74c93d61c02221eb9f3a309c8df1d1fa5bd2147dc4e68f8bb5d5ac18b4daa6857407f26fd841f922bc1b79112998f32b4aa42e51d134d2cb69cecc2c9ad67cf8eb03763710cd6e3ffee2404be28c334dfdc2232ec3548d5e6e5a6e96763d285aeacf459c867a429a3ffb0e2847377339e422db376b888cc36f5e385c7c35baaaf333a68c647ce6463c4c415f9e447115c1fb4f996552daaa9ca0d8cd00420446324244563238a6db2619102f444640e4fdf56eda58bf75fbf1387836d80f1b3792a0737f26cbedc4bc04fe29af2e23a4765142a07a91175137fdf3184caa77997b24cc3cd688d6870bd29db99254b062531999a6043b039196ced2cc0362da0c5cccbe6d00052d9affc0a91f3c1812d2efd1135b12bfc7d43342303376e86fa8dc162b519ba56f1d87152b8c851789b51b0cb925b3b2ed463bd5e405c8740964418c0ceacbd481898e1aa4ecc824d57c6ff587436863e228f5f77101cf798a885c81db63e1d612a3502f6034026af0b5afb95c29a00da2d181f4d367beafe5d0bacdd0ccddb3b689c915bf2529187f60a6cbd5b98b0a8a0e3e0312c8d64b960caa3aa9d0d610e235b72edc30bc1a34db26dafd61deae283443bea74fac459ffbe100a5c120f5b5f04f5cfd27e1c6eed44bba2363875626808fad9b0a096d4294fa7c9c6fb79f0028ffe4d21ebde1c190e45f1f65c87765cedbb126adef259c3cb0768aa9bbfcf5496f3cdf6ec0e446c797fe3935adb5d512f4677d608eba57f259a8a4387ddda9ff7b9d373a81343eaa27c1f27f3795120f0762ad724728f53251037a3e04b72c88ee4a0424a7d2e6de9196cbeb35095af2a93775e3cbd8c04a459d5747659a5f71532683ff039173d65a60ffa05a6151d8790c38150ea8e074cda229346b99206eed0b060cf0b1cb3084e92fa1f1a07f204885324a0ba6115a642d02f686f93a88e08e4f0545099983cedd597d35636f509025c5427dd4651f9a6c7773dc1148682f41e6ee872f7f841ebc481159adc9154e87b9695dac71e217f24687e06d9c62ccd10d294e8a8304903a0601c282499cd9d8b1d250c23803e328a5519e6f529be7fbe06ae4300a8a322f50e35931e8e671d763a76dec2be9681b6d60018b7a8127f2811c9eb26ede53ac492ed9853ed1fd7ea573d508cdb9def3fed9081e2c2de1951c3fd6f79b585beaa97e691858b347c116079771df43ab5ff3cbe052944ac35246a20bdebbb02b68f9ce752ade82c3835a0ae7733a4ffc85c29b45c97ed8fd9488cd2c986e0b7176c7ece758df6c44c110de710a161cbc91d3eb868329fd3afd620a7ee122715ffb606b5a6922307051900e7edf81f6059a313b435806bf7ff069c7ad6e8a14d8f69617718ee2da5d02b9959e6d003a41ff8915c50027822b0dbce281cd0d28adfdbbd1927a6bca65df99d374e4872d3f3a1aec12a4b800bba6196dfc859d5eeee09a840fb6a3964a9f3b9ca0842bfb9ad7f071d91f2238437eff557e4cb077939b7ee4b6380c0a3ec2fc9a89d147594af00bf0cdd9ae2ec6cf8d6365a699a208fe59c7507decf7ef08430b5563344bcee694556b6e51b7f0172fe6ebee397731e495a171c57598b230b2c56c63d11568df916657912cfa2ffacdeb3f261d6211ff050a2067c8863bab16cfe621dabf0eebb4dc9413d1cda648f5c8a167e8b7a3887d08e4d175d324a0e13dd34f3b780eb732c605b9ea8557045093afe2b5ec67053a8b9c95307fcbb81578609de347b6f23af1b0a1fddfd5631faa4769ad852371918ab6443070176d57b88893277145a0e432cadcf000000804eeed1e7855fa98a7404f8205483670e88742519537cb66647695582ed2e8218dc2bc20084ab7e2e94a1fa22470bffce85cf1e03ed869ea236f52429ad8db3bec4b250ce5e7935101ce831766780788a1de259dba8cdabe5ff836a309d4f3cf63273b6ffd666b2fc9fd875444d38f53ce8dc307c7a182af44972cfc569d8b435d4187cb3224b1a20e6afb86731a68c57ea2e40cdffc5610c81d184c95aa1b57eaedc7817a26a9b85a2de4ecd7298ebc409d3a80ab841797446d6b891c49257b52ed1c9f0f56d0f73139f3843cbe08b10f4806ea32b27239a080451b6e3e1454753210de9954ce8edf125a800e3290f63180b45d766a26f75d280de0316b6d8967d699bb04776ca61c4eabfd0d63ade8b343be7f048df03bc3eaa846418548903885f5dc767e2e517dd5f588227bd591c71c2fbc68be5a47345f8e6cdf6a1a0f08dcc625bbb5d9be1cf0a8750f612fbc3a1511ae3d14734b18122e10f69e53b2eca96d75325fbeda3944643f5c13bb675b884e5b91a30cb99c88528ea93cda837f6b3d01940acf38f6855077edd722df247d24cda2dc4499a539e9e638e4498daed8faafe8188b054474b26e534050fbcd491d3e1dc58c46a4c740aea33c7b73f7dd68ad38c622d121de89e840bf40fda46836626d88db107e5cb8d69c4e6e244c54a18733c0f81d91a9d92b246b63eb8da830836b73363c4db47b96bed2f89d1519e293f041f983b3661c5eb74b15d523132eaf7c21f8967264680e8c5336646b7b933ac7608fd8c60d3d5e08a923d9243d6069532e87e35807dee54c0e75dd418dcbdbbbbef28ac74bbcd62567fd41805e8daa588682cd0a65a58d53fc7f980224bdc8fe8c9688934e9306a838eff8eab80fc1ebc7a7ddad1175e1f20843c3a2036b37a5b145213a5c853adbab2d095be9455060e64d6a01d1b14cb302e408b6c7ce268c35e3ab11bcb28bb45e72040a89974aa81ebb84da384415859ea04e623868d72ba529d12a342b1f2c664433258a797ead11d739c88a8312561a44dd590f4e3ae7222779704b3e20926579945c1d9dc7bd01b408ebecde1237609aa140600d55dc70cc23f96394212cb137015bdb15cce8d16f3bd3da252bf41a5fd96fb625448b157746933d6916dda533bb1c8bee06da61b2901977cd2de2bc4f8badbe8625f8fe0075f06bec47687528f3c99f33e624c524bccf1301b8fcf499e8f4738030b85e58d1026b8425f26081a396d2e80ddbeedb9c9e05567719097da7e15fda4982b33cfe21c4be1dec4463e5fff87980b8c96494f5aa35e6220ef1164a945a5aba56c0bde2bf1e2dc8660b4b0f70fbcd3fcda91a18116ead77fec99a56e8f4d93e67903941060bc6a093fa7a285eb6597cb2d44bf6e9b3ae628c10b803aeb90edf250fbe5c97aef04713bd1111f2b48814cd5b0bc30dfa171b424d921f5162127a1b650459e7ba272f657e502d9704d4a67b14089f6d5b7199c9fa0d343cfce446c1121e8cc17e8d626687e8b47024820d51a1c5a4c779bdc854e904b32a2d97dff5861df40505756e6627b2b1da0c3a918face36e8d71063a0c757afd4d52aa02738c6fd2944624e79c70bbd18ae5e4a8b6daac0776c70fb92d27e2336f98e53b29f774c0772993d7826cac3fc4a7d22877ff4b73ff064be9b7f012e88abfc53d9efecc92373a8463cc677799079ecff037aacd2d8ac142db816487e188144a504665e20a110c16ad49da91423496164f1069a88d04a80f31e839abcf599912eea79e7f790045ace3c2ecf7056da09ac01be80292554e66ce6daff2f4cd04613a9081b98dc70883ae55ea6c4da42b9a569fa0f3a4a859e2800681137a0eb138ffb5a77a4cd292d5fe470e5fcfbdabaa062dfaea9911e90b1b6d41e219a2bb1bb424cb2200d2e81c2331f9351240e1ea99940e71fad2173cd5f9177822bf3fd8bb6db3a64702beadb7610dc156030a3b8b61bf6049f7c03a3f4775d06206df60fa100d6de9709da4b4ece8347e21767356edba00fc8da51c40270e0a5ab5ea90d038edefa750366eb112abc9b22c70e49a624bbdefa3f02788fdb55beb1938571e5908bd28b1a0c3a35d34fb5ac985f0393bd303f7508815202af1bbe11c8e18c98c1e8b6d3b22844395ce39a448ea41dc434c9429aee667bbd4d9378b6fc85ae190c9cac1b07316dcd9a8bf73f08a443ee3baa9caec74807267f04145427d5a01e6c8f1f9a07efa868a80b97230583dfbc401ae640070f5620f0f11fe78bc7acf05dc577248102af854b855c3ac7acfd90f309e200aea035e70c4188674636c060ea86869b4f946a25459450f2793d643cf665313a2744867b17e320e42f750fcad704c31c87532a0b7202a509698dcc2abd5a225533e56099de1ab6e9bb95678ed0c2e1601f3038267e9bfe456f08c207d1c5c7d2866606b368da90704d6736826c21e5225c8d7b3f9b996e6d10dd10df8f51033ffb159e0db4f686af3bec11a20a0937b10f46f979cc7218088fea680c8c7828a63771c4c43b8b6b4641e17d0cb0fdecb54334a34135c623f2a2fc8929c5df74582f35ea831519a47884aea8aa4d5b4cac70311da5d094275eb58cc7a7b8f5606a1bfa0d2c03640130b4346d58a437aaeb9ad64b85ef6048faf138c96a7187ebcb0bede98a847ad12d81db5606ac8ce55388e985938dd11bca21eb9fbb6f25d00b3a7795d3367d343c060839bfb39a325a688629f76013dffa9fd0d7ef788195c15ad1cd9d498182d0ba24d019dcde6851d7f6197f2c303fc507652fa775ef6803d4ed90c99d00c7f143fabf9d423636f2bc62dd17907d3ac113051d527871c162260082f39ca2badc64207f11b56de80c1946646d90fbd99d16705bed431ad21103d3486959721d77b29cedf7ea87ee2c0d2382ef80d6ae32548a87a2c88ff72bb7bbc47f97f478b77714e119b4986b8f646a6abdd3cbc53cd7874166da8cd1542ec333ccc18ea6ef3f4224888f6ec913935f336a109da98fd5d2f8a121e6d199521593981867164580a051d6071da2f3fd78bb84157bbad9d1c4ca92b0483bad9c900f0597a22642a0c20a0c4a8fc0d8fbe2df3ddfcea13abfe5c579d99adb3a6abea619e980fb6ac24bc134b5f0a516c409561923a6bb4a7db8b5c422bfdf17f10cde26c0b59885fbc7c5192efc8ab7983e12d65eeef3402fa736b50273705d3643ddf4fbb0626a3623d0f4573b8d49b5500cf4f542ab236a304a3c6bd8c31cf279e0438846e494337dfe2ba8247bf2423cfac70558b88d8075a4bfbdb259749314d7ebc91147fb998b0cf4c3adb154b933fb60190661889588f3716bb8d766a403771fb4597a0029e92a4c6f123ee09b283c003eda9736d9a84eb000b715008458246ff67be3ea7152dea99f0e9c14cef557c95f3b5ab94109c916b67c76d228e7fcd09db9f43e88796f17edfcf5acdeb936e09abf01dcce6769c201aafadbd2090fe2a2e1ff566e2c3e6ab083857510b5439679317aeca28bb632bba0bbb004ae94db0000000066ea5035"], 0x1028) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 232.460153] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 232.484955] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 232.516748] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "c0e24f8d269577defa72df1eb7044b0b6486c357"}, 0x15, 0x0) 14:10:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x3, 0x4) 14:10:53 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') lgetxattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@random={'system.', 'net/dev_mcast\x00'}, &(0x7f00000002c0)=""/221, 0xdd) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) [ 232.696629] tmpfs: No value for mount option ' 3333ff00001a [ 232.696629] 36 team_slave_1 1 0 3333ffaaaa1a [ 232.696629] 36 team_slave_1 1 0 3333ffaff80e [ 232.696629] 25 veth0_to_bridge 1 0 333300000001 [ 232.696629] 25 veth0_to_bridge 1 0 3333ff00001b [ 232.696629] 25 veth0_to_bridge 1 0 01005e000001 [ 232.696629] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 232.696629] 26 bridge_slave_0 1 0 333300000001 [ 232.696629] 26 bridge_slave_0 1 0 01005e000001 [ 232.696629] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 232.696629] 33 veth0_to_team 1 0 333300000001 [ 232.696629] 33 veth0_to_team 1 0 01005e000001 [ 232.696629] 33 veth0_to_team 1 0 3333ff00001f [ 232.696629] 33 veth0_to_team 1 0 3333ffaaaa1f [ 232.696629] 27 veth1_to_bridge 1 0 333300000001 [ 232.696629] 27 veth1_to_bridge 1 0 01005e000001 [ 232.793548] device hsr_slave_1 left promiscuous mode 14:10:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x4, 0x0, [], 0x0, 0x400000000000000, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x204040, 0x0) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x30b, 0x10001, 0x1e5c, 0xfffffffffffffffc, 0x4, @local}, 0x10) [ 232.827953] device hsr_slave_0 left promiscuous mode 14:10:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 232.877065] team0 (unregistering): Port device team_slave_1 removed [ 232.913593] team0 (unregistering): Port device team_slave_0 removed [ 232.947357] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 232.999360] tmpfs: No value for mount option ' 3333ff00001a [ 232.999360] 36 team_slave_1 1 0 3333ffaaaa1a [ 232.999360] 36 team_slave_1 1 0 3333ffaff80e [ 232.999360] 25 veth0_to_bridgenet/dev_mcast' [ 233.026387] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 233.175735] bond0 (unregistering): Released all slaves [ 234.991193] IPVS: ftp: loaded support on port[0] = 21 [ 235.826282] chnl_net:caif_netlink_parms(): no params data found [ 235.866259] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.873471] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.883163] device bridge_slave_0 entered promiscuous mode [ 235.889912] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.896416] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.904555] device bridge_slave_1 entered promiscuous mode [ 235.927470] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.936491] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.954182] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.961425] team0: Port device team_slave_0 added [ 235.969304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.976447] team0: Port device team_slave_1 added [ 235.981881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.989169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.062583] device hsr_slave_0 entered promiscuous mode [ 236.100522] device hsr_slave_1 entered promiscuous mode [ 236.140754] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 236.147728] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 236.164616] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.171025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.177597] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.183957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.210162] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 236.216266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.227810] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.236513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.244814] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.251577] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.268265] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 236.274586] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.284077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.292115] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.298461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.311846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.319399] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.325778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.341566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.349627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.357661] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.374196] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 236.384053] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.394770] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 236.405238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.412760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.420688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.432494] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 236.442585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.500693] device bridge_slave_1 left promiscuous mode [ 236.506220] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.544097] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 236.551572] device bridge_slave_0 left promiscuous mode [ 236.557250] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 236.557365] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.565604] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 236.580958] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 236.588651] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz1] on syz1 14:10:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000006b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c695e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:10:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x3, 0x4) 14:10:57 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2400, 0x0) r1 = getpgid(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) connect$pptp(r0, &(0x7f0000000300)={0x18, 0x2, {0x0, @empty}}, 0x1e) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x400000, 0x0) connect$bt_rfcomm(r2, &(0x7f0000000200)={0x1f, {0x1ff, 0x200, 0x4, 0x89, 0x6, 0xe9d}, 0x9e}, 0xa) read(r2, &(0x7f0000000040)=""/230, 0x20000346) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x20000, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000180)=',') 14:10:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:10:57 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:57 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 236.723634] tmpfs: No value for mount option ' [ 236.723634] 24 veth1 1 0 3333ffaaaa19 [ 236.723634] 30 bond_slave_0 2 0 333300000001 [ 236.723634] 30 bond_slave_0 2 0 01005e000001 [ 236.723634] 30 bond_slave_0 1 0 3333ff000017 [ 236.723634] 30 bond_slave_0 1 0 3333ffaaaa17 [ 236.723634] 34 team_slave_0 2 tmpfs' [ 236.774465] XFS (loop2): unknown mount option [subj_type=syz0]. [ 236.786504] tmpfs: No value for mount option ' [ 236.786504] 24 veth1 1 0 3333ffaaaa19 [ 236.786504] 30 bond_slave_0 2 0 333300000001 [ 236.786504] 30 bond_slave_0 2 0 01005e000001 [ 236.786504] 30 bond_slave_0 1 0 3333ff000017 [ 236.786504] 30 bond_slave_0 1 0 3333ffaaaa17 [ 236.786504] 34 team_slave_0 2 tmpfs' [ 236.832459] device hsr_slave_1 left promiscuous mode [ 236.878685] device hsr_slave_0 left promiscuous mode 14:10:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x3, 0x4) [ 236.919460] team0 (unregistering): Port device team_slave_1 removed [ 236.934613] team0 (unregistering): Port device team_slave_0 removed [ 236.949010] bond0 (unregistering): Releasing backup interface bond_slave_1 14:10:57 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000000)=0x6e) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0xfffffffffffffe68) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:57 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:10:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000040)=0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffffd5a, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x8000000402}, 0x23d) [ 236.979503] bond0 (unregistering): Releasing backup interface bond_slave_0 14:10:57 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') alarm(0xb58) read(r0, &(0x7f0000000040)=""/230, 0xe6) write$cgroup_subtree(r0, &(0x7f00000001c0)={[{0x2b, 'cpu'}, {0x2b, 'cpu'}, {0x0, 'rdma'}, {0x2f, 'pids'}, {0x2f, 'cpu'}, {0x2b, 'pids'}, {0x0, 'memory'}]}, 0x29) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2200, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) fcntl$lock(r1, 0x24, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r2}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x200000, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:10:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:10:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="40c23d1726344e1bce865d163aae654f75f032077e0f4f30901e0e708a85d70aee402c8f763eff3426ce2a875260fed1caf4dbc720e30901d1c9798227b9e1f2e1bd485aa252c57f422f696dd274cc4f62c971becd1a083890a10ebc5e2d2ea430da714a194dc03a04f67effc2197154aa", 0x71, 0xfffffffffffffffa) keyctl$get_security(0x11, r1, &(0x7f0000000280)=""/32, 0x20) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x800) 14:10:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:10:57 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x80000) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000200)=0x54) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 237.198210] bond0 (unregistering): Released all slaves [ 237.329950] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 237.339817] tmpfs: No value for mount option ' 3333ff00001a [ 237.339817] 36 team_slave_1 1 0 3333ffaaaa1a [ 237.339817] 36 team_slave_1 1 0 3333ffaff80e [ 237.339817] 25 veth0_to_bridge 1 0 333300000001 [ 237.339817] 25 veth0_to_bridge 1 0 3333ff00001b [ 237.339817] 25 veth0_to_bridge 1 0 01005e000001 [ 237.339817] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 237.339817] 26 bridge_slave_0 1 0 333300000001 [ 237.339817] 26 bridge_slave_0 1 0 01005e000001 [ 237.339817] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 237.339817] 33 veth0_to_team 1 0 333300000001 [ 237.339817] 33 veth0_to_team 1 0 01005e000001 [ 237.339817] 33 veth0_to_team 1 0 3333ff00001f [ 237.339817] 33 veth0_to_team 1 0 3333ffaaaa1f [ 237.339817] 27 veth1_to_bridge 1 0 333300000001 [ 237.339817] 27 veth1_to_bridge 1 0 01005e000001 14:10:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) sendfile(r0, r0, &(0x7f0000000040), 0xcce) [ 237.520046] tmpfs: No value for mount option ' 3333ff00001a [ 237.520046] 36 team_slave_1 1 0 3333ffaaaa1a [ 237.520046] 36 team_slave_1 1 0 3333ffaff80e [ 237.520046] 25 veth0_to_bridge 1 0 333300000001 [ 237.520046] 25 veth0_to_bridge 1 0 3333ff00001b [ 237.520046] 25 veth0_to_bridge 1 0 01005e000001 [ 237.520046] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 237.520046] 26 bridge_slave_0 1 0 333300000001 [ 237.520046] 26 bridge_slave_0 1 0 01005e000001 [ 237.520046] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 237.520046] 33 veth0_to_team 1 0 333300000001 [ 237.520046] 33 veth0_to_team 1 0 01005e000001 [ 237.520046] 33 veth0_to_team 1 0 3333ff00001f [ 237.520046] 33 veth0_to_team 1 0 3333ffaaaa1f [ 237.520046] 27 veth1_to_bridge 1 0 333300000001 [ 237.520046] 27 veth1_to_bridge 1 0 01005e000001 [ 239.281622] IPVS: ftp: loaded support on port[0] = 21 [ 240.242556] chnl_net:caif_netlink_parms(): no params data found [ 240.282228] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.288636] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.295900] device bridge_slave_0 entered promiscuous mode [ 240.307407] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.315396] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.322545] device bridge_slave_1 entered promiscuous mode [ 240.339537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.349005] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.371675] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.379186] team0: Port device team_slave_0 added [ 240.384639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.392191] team0: Port device team_slave_1 added [ 240.397374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.404897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.473758] device hsr_slave_0 entered promiscuous mode [ 240.510376] device hsr_slave_1 entered promiscuous mode [ 240.550532] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 240.560137] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 240.572814] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.579177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.585840] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.592220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.623393] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 240.629504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.637888] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.650192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.657191] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.664612] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.673958] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 240.680792] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.692641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.700977] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.707328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.726353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.734075] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.740453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.757015] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 240.766942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.780418] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 240.789880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.797912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.805883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.813926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.821493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.828257] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.842225] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 240.852493] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.870839] device bridge_slave_1 left promiscuous mode [ 240.876368] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.911113] device bridge_slave_0 left promiscuous mode [ 240.916620] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.015527] device hsr_slave_1 left promiscuous mode [ 241.054379] device hsr_slave_0 left promiscuous mode [ 241.093028] team0 (unregistering): Port device team_slave_1 removed [ 241.103985] team0 (unregistering): Port device team_slave_0 removed [ 241.113870] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 241.155234] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 241.224878] bond0 (unregistering): Released all slaves [ 241.295193] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 242.392205] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 242.398958] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 242.407995] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 242.415402] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 242.423304] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:03 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:11:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:03 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) inotify_init1(0x80000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) 14:11:03 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 242.587227] tmpfs: No value for mount option ' 3333ff00001a [ 242.587227] 36 team_slave_1 1 0 3333ffaaaa1a [ 242.587227] 36 team_slave_1 1 0 3333ffaff80e [ 242.587227] 25 veth0_to_bridge 1 0 333300000001 [ 242.587227] 25 veth0_to_bridge 1 0 3333ff00001b [ 242.587227] 25 veth0_to_bridge 1 0 01005e000001 [ 242.587227] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 242.587227] 26 bridge_slave_0 1 0 333300000001 [ 242.587227] 26 bridge_slave_0 1 0 01005e000001 [ 242.587227] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 242.587227] 33 veth0_to_team 1 0 333300000001 [ 242.587227] 33 veth0_to_team 1 0 01005e000001 [ 242.587227] 33 veth0_to_team 1 0 3333ff00001f [ 242.587227] 33 veth0_to_team 1 0 3333ffaaaa1f [ 242.587227] 27 veth1_to_bridge 1 0 333300000001 [ 242.587227] 27 veth1_to_bridge 1 0 01005e000001 [ 242.683077] XFS (loop2): unknown mount option [subj_type=syz0]. 14:11:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:03 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') r1 = getuid() r2 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x10001, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64253d30303030303030303030303000010000000000003030302ce10aa9464b68416786adb12c88c3cda91692192121bfdae84815b7a693ed133f883f1b6cdaac3d82c3639bc0c05bec1d8d33e3caa4b93113398347736338277112d25d7d5191a83ae762635c1488e8a00000000000000000", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,max_read=0x0000000000000008,allow_other,max_read=0x000000000000003f,smackfsroot=tmpfs\x00,uid=', @ANYRESDEC=r3, @ANYBLOB=',dont_appraise,hash,\x00']) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:03 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 242.848050] XFS (loop2): unknown mount option [subj_type=syz0]. [ 242.857533] tmpfs: No value for mount option ' 3333ff00001a [ 242.857533] 36 team_slave_1 1 0 3333ffaaaa1a [ 242.857533] 36 team_slave_1 1 0 3333ffaff80e [ 242.857533] 25 veth0_to_bridge 1 0 333300000001 [ 242.857533] 25 veth0_to_bridge 1 0 3333ff00001b [ 242.857533] 25 veth0_to_bridge 1 0 01005e000001 [ 242.857533] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 242.857533] 26 bridge_slave_0 1 0 333300000001 [ 242.857533] 26 bridge_slave_0 1 0 01005e000001 [ 242.857533] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 242.857533] 33 veth0_to_team 1 0 333300000001 [ 242.857533] 33 veth0_to_team 1 0 01005e000001 [ 242.857533] 33 veth0_to_team 1 0 3333ff00001f [ 242.857533] 33 veth0_to_team 1 0 3333ffaaaa1f [ 242.857533] 27 veth1_to_bridge 1 0 333300000001 [ 242.857533] 27 veth1_to_bridge 1 0 01005e000001 14:11:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x7f) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0x8}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:03 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 243.074466] XFS (loop2): unknown mount option [subj_type=syz0]. [ 243.930422] device bridge_slave_1 left promiscuous mode [ 243.936105] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.990869] device bridge_slave_0 left promiscuous mode [ 243.996422] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.142727] device hsr_slave_1 left promiscuous mode [ 244.182892] device hsr_slave_0 left promiscuous mode [ 244.243086] team0 (unregistering): Port device team_slave_1 removed [ 244.253577] team0 (unregistering): Port device team_slave_0 removed [ 244.262978] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 244.316652] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 244.392424] bond0 (unregistering): Released all slaves [ 246.210959] IPVS: ftp: loaded support on port[0] = 21 [ 247.149199] chnl_net:caif_netlink_parms(): no params data found [ 247.181997] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.188426] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.195561] device bridge_slave_0 entered promiscuous mode [ 247.202847] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.209284] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.216454] device bridge_slave_1 entered promiscuous mode [ 247.232310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.241845] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.258393] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.265910] team0: Port device team_slave_0 added [ 247.271609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.278632] team0: Port device team_slave_1 added [ 247.283967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.291236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.345314] device hsr_slave_0 entered promiscuous mode [ 247.380496] device hsr_slave_1 entered promiscuous mode [ 247.420849] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 247.427821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 247.441376] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.447759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.454531] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.461111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.490836] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 247.496949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.506269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.523340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.531352] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.538889] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.551407] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 247.557533] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.567532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.575606] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.582021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.591687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.599242] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.605651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.621400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.629193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.641576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.649320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.661496] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 247.671801] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 247.677993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.685129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.699065] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 247.709345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.140452] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 248.734033] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 248.742510] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 248.749256] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 248.756183] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 248.763813] hid-generic 0000:0000:0000.0015: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:09 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:09 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept4(r0, &(0x7f0000000300)=@in={0x2, 0x0, @remote}, &(0x7f0000000380)=0x80, 0x80000) mknod$loop(&(0x7f00000007c0)='./file1\x00', 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net\xa5\v\x00\x00\x00\x00\x00\x00st\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000000)={0x7, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) 14:11:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@nolargeio='nolargeio'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2220}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1f, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "bc3c9983f6926dc9", "1b0d22b000ceafedc9c418a55c0adfbb41616ae41ccd1d54841cef3134709c52", "3d9562e5", "79d1f81ef39592cd"}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) fadvise64(r1, 0x3b, 0xf8b, 0x1) 14:11:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:09 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 248.863906] XFS (loop2): unknown mount option [subj_type=syz0]. 14:11:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:09 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000200)) read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 248.985396] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 14:11:09 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='\xe0n\x03`s\x00', 0x0, &(0x7f0000000000)=',') 14:11:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x80000) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x24) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 249.030879] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 249.067580] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 249.070484] XFS (loop2): unknown mount option [subj_type=syz0]. 14:11:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 249.110767] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 249.161713] hid-generic 0000:0000:0000.0016: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:09 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x20802) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/69) 14:11:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:09 executing program 3: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x1000, 0x1) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000002940)) sendmmsg$inet6(r0, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="6691b53e78357426eb72d69025127ab352edb6accbaf1092e9ce78cc8538d3e773fb468db94d1b587292f00a2b92e3e020b6a816bd108aee26767b41a3e92b76f07b7c92d489caf765636b3cffb1b2dd560d38143c4cb3e2a810e96030281ed557c446072df250a7142c82473ce30e9cd920fcc9b45a2bcf20b4a093cb04d7d4c3dacddc", 0x84}, {&(0x7f0000000200)="41dfde7fe4c693d4d94f34df25d8a998e0ba8b3ef62da8fa8acbf78822f571ff58055d2bb699ac1a195bd49953d5764560c50a66ba28d9e9281e9da991d9212549f0d96bd97c0be31e553924167cf2014f9a5342314f9001351e1267f42ecc", 0x5f}, {&(0x7f00000002c0)="349d2deeaf7a43e39807b7f7afd0ddd08741ea6b1e5b9fb5e099b3057aec9940d21fb6177ec42d6045251e2ec26378e1fabc733b012e29fc5696f61549f2e1bd6e58a2e36160a8a1ac40e7fb09921185a5ed085d4c919f8d33726bbf64fdb24d7e1ccc5a84", 0x65}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000140)="e6a275be0e9f19245477de247b537b9533aaf50f8df351a8", 0x18}, {&(0x7f0000000340)="e8d0c488f8c7d0f2c25f51ffbdddca038fbf947d2a0366ebd87125a3ee1a4049f4b63a5e3a9126f21c3a898d77217c6624aa64addd0350d77b0718ec91d859", 0x3f}], 0x6, &(0x7f0000001740)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x0, 0x8, 0xcb03d262b8622b6c, 0x662, 0x0, [@remote, @rand_addr="276d76f45d47853243c8a27e1a8999cb", @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @local}]}}}, @rthdr={{0x88, 0x29, 0x39, {0xff, 0xe, 0x2, 0xd0, 0x0, [@mcast2, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @multicast1}, @empty, @rand_addr="5657582efa3f7b990a0d01786415ff84", @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x1, 0x0, [], [@pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x118}}, {{&(0x7f0000000400)={0xa, 0x4e24, 0x1, @local, 0x2}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000000540)="41e825b586ddde6ff8077a8f6262e81a14276399b4c1c2e23b996e104ac46509aafa842b10bdba38ca4740e1360ef8d2aa97848befb5f5b78bd4cb1aaa6a2bda192d1c823b8ebc39feabe82db55caec1cd1ac48ef1727e17e8aca8494e90db3ddf50cfbf42a9", 0x66}], 0x24d, &(0x7f0000002880)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r1}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x0, 0x3, [], [@pad1, @enc_lim={0x4, 0x1, 0x5}, @jumbo, @ra={0x5, 0x2, 0x7}, @pad1, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7ff}}], 0x90}}], 0x2, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r2, &(0x7f0000000640)=""/230, 0xffffffffffffff3a) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x4) mount(0x0, &(0x7f00000029c0)='./file0\x00', &(0x7f0000002980)='selinuxfs\x00', 0x20, &(0x7f0000002a40)='vcan0\x00') [ 249.349649] XFS (loop2): unknown mount option [subj_type=syz0]. [ 249.487760] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 249.499360] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 249.513101] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 249.519926] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 249.529067] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on syz1 [ 251.191574] IPVS: ftp: loaded support on port[0] = 21 [ 251.972011] chnl_net:caif_netlink_parms(): no params data found [ 252.005971] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.012496] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.019412] device bridge_slave_0 entered promiscuous mode [ 252.026294] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.032765] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.039662] device bridge_slave_1 entered promiscuous mode [ 252.057549] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.067047] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.087040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.094353] team0: Port device team_slave_0 added [ 252.099783] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.106988] team0: Port device team_slave_1 added [ 252.112434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.119621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.173738] device hsr_slave_0 entered promiscuous mode [ 252.210373] device hsr_slave_1 entered promiscuous mode [ 252.250634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.257558] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.270839] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.277204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.283855] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.290226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.318133] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 252.324669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.332877] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.341728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.348692] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.356289] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.366144] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 252.372435] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.380910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.388427] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.394794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.411372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.418928] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.425300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.433528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.441196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.448994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.460913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.470479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.479439] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.485709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.498304] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 252.509614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.960478] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 253.520756] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 253.527511] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 253.535600] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 253.551597] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 253.559165] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@bsdgroups='bsdgroups'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) 14:11:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2a6405000000000065040414010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b6019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x4, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffe28}, 0x70) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x401, 0x6, 0x319e, 0x7ff, 0x3fcbcd6b, 0x6}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f00000000c0)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:14 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:14 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:14 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0xe6) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:14 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000200)={0x40, 0x1732}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000002c0)={{0x9, 0x0, 0xff, 0x0, 'syz0\x00', 0x4}, 0x3, 0x0, 0x5, r1, 0x8, 0x1815, 'syz0\x00', &(0x7f0000000180)=['ppp0cpuset$eth0\x00', '\\bdev!\x00', ',', '\x00', '(\x00', 'wlan0cgroupcgroup+loloprocnodev!\x00', '#\x00', '{%wlan0.&\x00'], 0x48, [], [0x0, 0x8, 0x3eb, 0x9f]}) read(r0, &(0x7f0000000040)=""/230, 0xe6) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 253.658897] XFS (loop2): unknown mount option [subj_type=syz0]. [ 253.668495] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 14:11:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8100, 0x1) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x319, 0xffff, 0x3, 0x1, 0x4ade, @local}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}], [{@subj_type={'subj_type', 0x3d, 'syz0\x00'}}]}) [ 253.700551] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 253.732693] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 14:11:14 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="8700000029810e020000000002000000010400000000000002000000000000000707002e2f66696c65300003000000030000000000000006000000000000002007002e2f66696c65302004000000040000000000000001000100000000000107002e2f66696c65301e00000000050000000000000001000080000000000907002e2f66696c65308e61c5d4d4b43337ce523f8532ce6a74b1b047dea1b49f101f1e3efb070cc9b6a01d015e9bcda943c675a7b6add949583622309afb1d5bd83911b9744766f5777e76f672bfeace3c6d039c65238949d36d3af0ff30482ad357a74cec76f699b8cb9ce85e5725e18f34f62b"], 0x87) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x400000000000, 0x40500) signalfd4(r0, &(0x7f0000000000)={0x100}, 0x8, 0x80800) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 253.804345] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 253.841197] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:14 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 253.876648] XFS (loop2): unknown mount option [subj_type=syz0]. [ 253.914492] tmpfs: No value for mount option ' 3333ff00001a [ 253.914492] 36 team_slave_1 1 0 3333ffaaaa1a [ 253.914492] 36 team_slave_1 1 0 3333ffaff80e [ 253.914492] 25 veth0_to_bridge 1 0 333300000001 [ 253.914492] 25 veth0_to_bridge 1 0 3333ff00001b [ 253.914492] 25 veth0_to_bridge 1 0 01005e000001 [ 253.914492] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 253.914492] 26 bridge_slave_0 1 0 333300000001 [ 253.914492] 26 bridge_slave_0 1 0 01005e000001 [ 253.914492] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 253.914492] 33 veth0_to_team 1 0 333300000001 14:11:14 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 253.914492] 33 veth0_to_team 1 0 01005e000001 [ 253.914492] 33 veth0_to_team 1 0 3333ff00001f [ 253.914492] 33 veth0_to_team 1 0 3333ffaaaa1f [ 253.914492] 27 veth1_to_bridge 1 0 333300000001 [ 253.914492] 27 veth1_to_bridge 1 0 01005e000001 14:11:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}]}) 14:11:14 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000002c0)=','}, 0x30) ioctl$int_out(r1, 0x5462, &(0x7f0000000000)) r2 = syz_open_procfs(r0, &(0x7f0000000340)='net/sockstat\x00') read(r2, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) 14:11:14 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:14 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x42c000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x4c, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x1, @empty, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, @in={0x2, 0x4e21, @remote}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r2, 0x8}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 254.192206] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 254.207255] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 254.226461] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 254.250655] tmpfs: No value for mount option ' 3333ff00001a [ 254.250655] 36 team_slave_1 1 0 3333ffaaaa1a [ 254.250655] 36 team_slave_1 1 0 3333ffaff80e [ 254.250655] 25 veth0_to_bridge 1 0 333300000001 [ 254.250655] 25 veth0_to_bridge 1 0 3333ff00001b [ 254.250655] 25 veth0_to_bridge 1 0 01005e000001 [ 254.250655] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 254.250655] 26 bridge_slave_0 1 0 333300000001 [ 254.250655] 26 bridge_slave_0 1 0 01005e000001 14:11:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 254.250655] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 254.250655] 33 veth0_to_team 1 0 333300000001 [ 254.250655] 33 veth0_to_team 1 0 01005e000001 [ 254.250655] 33 veth0_to_team 1 0 3333ff00001f [ 254.250655] 33 veth0_to_team 1 0 3333ffaaaa1f [ 254.250655] 27 veth1_to_bridge 1 0 333300000001 [ 254.250655] 27 veth1_to_bridge 1 0 01005e000001 [ 254.338397] XFS (loop2): Invalid superblock magic number 14:11:14 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 254.350607] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 254.380741] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:15 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x50, 0x1ff, 0x17f626af, 0x7db, 0x0, 0x4, 0x138, 0xe, 0x10000, 0x8, 0x6, 0x7, 0x180000000, 0x3, 0x7f, 0xe915, 0xfffffffffffffffe, 0x400, 0x5, 0x7, 0x81, 0x6, 0xfff, 0x101, 0x8001, 0xfffffffffffffffe, 0xfffffffffffffe00, 0x6, 0x7, 0x80000001, 0x9, 0x0, 0x80000001, 0x9, 0xf7, 0x4ee, 0x0, 0x40, 0x0, @perf_config_ext={0x2, 0xffffffffffffff17}, 0x10, 0x2c55, 0x7fffffff, 0x4, 0x3, 0x5, 0x9}, r0, 0x2, r1, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}]}) 14:11:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:15 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mdast\x00') syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x200000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x1) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000140)={&(0x7f0000000080), &(0x7f00000000c0)=""/125, 0x7d}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:15 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000180)='./file0\x00', 0x3ff, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="fe38b53207d6ad758aa9799985499146f4b2cb501243c16baafd4f00844847e41f1930f3b0487d6326650c19a3b26e3fd0ac952fa1efd7c94a1e2e62fa685ca5bce2c40799478c67b0a61dc2bab56a8e96f6a42a7b060d480e3f5dd417c43063bd0b2e17f0feb0971c6a833221357bcfa38f1b43dc450c6f21201247c2c4f690732e41f1c0227e365782c6aba845a322713e1e63f8b6de776b0b576f9af150", 0x9f, 0x5}, {&(0x7f00000002c0)="d7af7f583b936c06c38b66c7035f9f825c64d9f70f730184085ce0f2a7b50e125b3879492a16172c214cad89cd8713715b1277d948df3e0db1173a0d09b437fc82daaeeefd1966ef2de772425cd036514f21472f945d18e688b7ed4a940493", 0x5f, 0x6}], 0x2800040, 0x0) [ 254.614230] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 254.626841] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 254.635415] XFS (loop2): Invalid superblock magic number 14:11:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 254.667300] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 14:11:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)={[{@nolargeio='nolargeio'}, {@discard='discard'}, {@noquota='noquota'}]}) [ 254.708245] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 254.732104] tmpfs: No value for mount option ' 3333ff00001a [ 254.732104] 36 team_slave_1 1 0 3333ffaaaa1a [ 254.732104] 36 team_slave_1 1 0 3333ffaff80e [ 254.732104] 25 veth0_to_bridge 1 0 333300000001 [ 254.732104] 25 veth0_to_bridge 1 0 3333ff00001b [ 254.732104] 25 veth0_to_bridge 1 0 01005e000001 [ 254.732104] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 254.732104] 26 bridge_slave_0 1 0 333300000001 [ 254.732104] 26 bridge_slave_0 1 0 01005e000001 [ 254.732104] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 254.732104] 33 veth0_to_team 1 0 333300000001 [ 254.732104] 33 veth0_to_team 1 0 01005e000001 [ 254.732104] 33 veth0_to_team 1 0 3333ff00001f [ 254.732104] 33 veth0_to_team 1 0 3333ffaaaa1f 14:11:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a40)={0x0, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @remote}, 0x60df}}}, &(0x7f0000000b00)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000b40)={r1, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x800, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000700)={0x4, 0x5, [{0x1, 0x0, 0x10001}, {0xfff, 0x0, 0x7}, {0x80000000, 0x0, 0xffffffff80000000}, {0xcf4e, 0x0, 0x6}]}) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000540)=0x40) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f2ff00000000b7060000ffffffff2d640500000000006504040001000000040400000000000000000000004000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c2046f04e77969be0634674d0942b66b249b351859bb7e390b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec55b4587d253dd311e874832f925b6dbd2af21b75fe26aa5e85ae281993bfa213922bb755c1f1abd196407b4c8fabe27b2121a5f03dff2c0000000000000000000000000035fdc196ab8e71e82e50f2547f356d56df6065f9e04cdb38c7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f0000000080)) r5 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x7b66ccd1, 0x40) fcntl$notify(r2, 0x402, 0x2a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000680)={0xf, 0x8, 0xfa00, {r6, 0x1f}}, 0x10) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000005c0)={0x18, 0x0, 0x6, {0x7}}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000480)={0x7, 0x8000, 0x5, 0x3, 0x0}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000007c0)={r7, 0x114, "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"}, &(0x7f0000000580)=0x11c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0xc, 0x5, 0x7}, &(0x7f0000000280)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x9}}, 0x10) [ 254.732104] 27 veth1_to_bridge 1 0 333300000001 [ 254.732104] 27 veth1_to_bridge 1 0 01005e000001 [ 254.840529] MINIX-fs: unable to read superblock [ 254.853261] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 254.953748] XFS (loop2): Invalid superblock magic number [ 255.070643] device bridge_slave_1 left promiscuous mode [ 255.076188] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.110016] tmpfs: No value for mount option ' 3333ff00001a [ 255.110016] 36 team_slave_1 1 0 3333ffaaaa1a [ 255.110016] 36 team_slave_1 1 0 3333ffaff80e [ 255.110016] 25 veth0_to_bridgenet/dev_mcast' [ 255.136426] MINIX-fs: unable to read superblock [ 255.151027] device bridge_slave_0 left promiscuous mode [ 255.156936] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.312747] device hsr_slave_1 left promiscuous mode [ 255.353561] device hsr_slave_0 left promiscuous mode [ 255.404151] team0 (unregistering): Port device team_slave_1 removed [ 255.424098] team0 (unregistering): Port device team_slave_0 removed [ 255.442904] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 255.473137] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 255.553499] bond0 (unregistering): Released all slaves [ 257.231369] IPVS: ftp: loaded support on port[0] = 21 [ 258.128647] chnl_net:caif_netlink_parms(): no params data found [ 258.167187] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.174406] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.181713] device bridge_slave_0 entered promiscuous mode [ 258.188360] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.194824] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.201767] device bridge_slave_1 entered promiscuous mode [ 258.219703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.228754] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 258.253236] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.261012] team0: Port device team_slave_0 added [ 258.266435] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.274172] team0: Port device team_slave_1 added [ 258.279713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.287200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.344422] device hsr_slave_0 entered promiscuous mode [ 258.380505] device hsr_slave_1 entered promiscuous mode [ 258.420831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 258.427823] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 258.440854] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.447237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.453900] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.460287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.488324] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 258.494799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.504711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.513517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.521674] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.528429] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.543383] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 258.549472] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.557900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.565580] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.571950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.582032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.589612] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.596062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.609434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.625305] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 258.635919] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.646412] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 258.653660] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.660811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.668440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.676248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.683982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.696709] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 258.706992] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.120530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 259.905876] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 259.915246] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 259.924890] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 259.931746] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 259.939323] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:20 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040464888e9868bcc8f4872a000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xfd5893482b25ef36) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:20 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) getpid() r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x158, r1, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xffffffffffff2f96, @dev={0xfe, 0x80, [], 0xa}, 0xfffffffffffffffa}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe8ca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1157}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xad}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfa}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}]}]}, 0x158}}, 0x4000041) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000240)='wchan\x00') read(r3, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 260.039864] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 260.065553] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 14:11:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x0, 0x8}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40001, 0x80) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) [ 260.087401] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 14:11:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:20 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0xfffffffffffffffc, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000180)=""/7, &(0x7f00000001c0)=0x7) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000000)={0x80, 0x7fffffff, 0x3, @random="d8237f840b09", 'ip6tnl0\x00'}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r0, 0x4) read(r0, &(0x7f0000000040)=""/230, 0x20000346) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 260.121704] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 14:11:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x24) 14:11:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 260.181555] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:20 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:20 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') socket$inet6(0xa, 0x3, 0xd14) read(r0, &(0x7f0000000040)=""/230, 0x20000346) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 260.346362] tmpfs: No value for mount option ' 3333ff00001a [ 260.346362] 36 team_slave_1 1 0 3333ffaaaa1a [ 260.346362] 36 team_slave_1 1 0 3333ffaff80e [ 260.346362] 25 veth0_to_bridge 1 0 333300000001 [ 260.346362] 25 veth0_to_bridge 1 0 3333ff00001b [ 260.346362] 25 veth0_to_bridge 1 0 01005e000001 [ 260.346362] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 260.346362] 26 bridge_slave_0 1 0 333300000001 [ 260.346362] 26 bridge_slave_0 1 0 01005e000001 [ 260.346362] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 260.346362] 33 veth0_to_team 1 0 333300000001 [ 260.346362] 33 veth0_to_team 1 0 01005e000001 [ 260.346362] 33 veth0_to_team 1 0 3333ff00001f [ 260.346362] 33 veth0_to_team 1 0 3333ffaaaa1f [ 260.346362] 27 veth1_to_bridge 1 0 333300000001 [ 260.346362] 27 veth1_to_bridge 1 0 01005e000001 [ 260.484224] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 260.497733] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 260.504569] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 260.514871] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 260.522566] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:21 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @rand_addr=0x10000}, @in6={0xa, 0x4e21, 0xb60, @mcast1, 0x17}, @in6={0xa, 0x4e20, 0xfff, @remote, 0x9}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x3ff, @loopback, 0xfff}, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x7}, @in={0x2, 0x4e23, @broadcast}], 0xdc) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8000, 0x400) fchmod(r1, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400000107f5e50a34f17c9b3100006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf4897969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002da57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd85b3281993bfa213923bb755c1f1b16d873c285c7fcfb416b8f8f58fabd196"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) dup2(r1, r3) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x100000008}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000140)={r5, 0xd4b}, &(0x7f0000000280)=0x8) 14:11:21 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:21 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:21 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b40)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000500)='net/devWmcast\x00') sendmmsg$sock(r1, &(0x7f0000002a00)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="a6470afd0760b756cb842e8588d24e211584ba500adf104ccbd1020d7cd70fe8cb44e5331a80887388caa8819b7e51994656deacd4cbf1c629448048", 0x3c}, {&(0x7f00000001c0)="4ddd86dcfaecc6fb3a8018ff8c49deea58e4e036f55741", 0x17}, {&(0x7f0000000800)="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", 0x1000}], 0x3}}, {{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="c906fa34062f2639fedd6495292e5de686dacf371b75622d91b29388f2960a53e8fa1c81fd15882151c6e6aa31977bb06cda0d4bb6e677723cd689837f1b9c1e551f2192be49788799eab1d2dc86688b386134afa3ccceb7783fa0d456c432aae3ec04de5dd0d901bd314281b317e05c7610ed58a44195b10615191327dc3d13502bce5573dd6419acf7cf51d843aaceda3f6786dc8edeb65f3f07aba688ab7936ae3a521c3bb2ca932f25d63c5f22d221a3752ffb6a70b76e9976a34fba75dcba51bec32684294aec7af455ed88799de87c160b0c887d0cbe5a3e9fa93c736609b85738a25bcf2400615a5fd656a4d8b4ffdc5c6bc82442f8", 0xf9}, {&(0x7f0000000540)="9f7da6c0ade277923fa95802f881fba463bf03c95e84fef30c72bff6e89005e998b625965a422cf9df411e108f559ef0e7de04f169403638d602b70584ad497cdbc22ede7627d800b42415000063f1b41391ba7cd32720f0b35f2fe82acaf226b0cacece7617c6411eab2f21d0a06dd643ce15458c54", 0x76}, {&(0x7f0000001800)="a019194532b90a6d2c2685878b889a3fa3fc91f76aac59be88ed76e92270e5c1137dc9ee14e09253235cf0ee04209ed4cf8e873521ec861a17b968f9bb947f0458711f5f88758e75d20722b2a9a6604ca2530496fbb55952aec1217173d39d445c27b5ce300e0b29c69125627d1dc19edda11f3d04d8bd5f64b0a71abc164d3d4e0fc527fc25a1a278086ab684a33d4649389f6aaef42bbaed36138812c7044935a7dafd4bb96d29f471ce223a24490c9d319b48282ea1113fc7845d3ba463872dabe34a1861a25cdefc310e79ad88d2e6c745e9e6df9d3cdd834efb6f436476e43645cc1f36a39bb28a8482ce5b2720da982dc58e601c550eb055a8464ee1b680d8c0d36329606d4d21fe40a8d66db8a2c26be02cdceaa1e9dd925f94d63e81b715396781ed2c745ba742960bb42e2e3a9a17b3a0e7bc19bbaf945122b4c46ba38607c7d5f6434a4cc29c55fd9af150de5a2f50a10929a5562f7d32a0024aa2e153591ab00fdc368fc2114d40c9467ba976d3ac9d81e74ed3946b65c904fa4f7c94015e45af7e450bdde755540f3389f019a2f44cd36201c54a2a0e2bb49fa7b700a738e15143e530c9f06547d6ed88727f9455f2a0a6f6a391594a384630d189aaf0f686c7d8de85a6d13db57446bf5751ab44a47838f801b7b031ebd61851f629bfd3185d7e1be39d31317302820dcee72ec7c7c39a639f7ce90880c16899dfd080bdca78f9d37aa40a97d53f2d23d49168167253103e723f8b3e77e1ac6f6fa8471929a8b8add0c753ba37948b6296b7169d593601bd2fd77b6ab7fb688e5d22c5e1a6c79786e88925ac1864d26f9ac556a735ab3a1160914ef0c4a0b4926af79f610aac7755ccdcb609ba3a41ed9f734ac3c609cd652306ab34bd258b5af87364e88c30d40baac483708568d9c9de04c9234bcbc996fe74d6a3e9d4138cfa0f782b69db493508e7fcd4b48c0041fabb97a3ee3aa4f2a6513b6438e51b4aaf284ec464fdc96c87c9f4d768f9e50e73a8e7f4ce44273c8e2cc18e5302b295ce1c79a86a461ab0016b6d35d4291c618996936ec743176b51f72643f9774cb8b5a9e57a8035ed8ed46d9e242dc9cd05cb7b18a9ec6c8a399bfe01463c38c75aceb8dc807814afef3ba34d04ecffb39336b5922df8c7e595311ec3c3fd9c0b6f99dc8336d3fdd1b347b35a49c5de1c43268be85442c21ca6373d326cfafa1b53485b99bad1951988335ed2f7c632595754d5d7cb3ef44d61325f3b4adff9bbf803d8dbccb0f27e290d669db7e9ec53c5f40f2705cf494990ba3f16a6244ad37d50e5cb9f198f1616589bc9d43dda24f2e6295f193493819f64861a9dd6ff2ee29454d547b2cb7134b4b89e7b2e7f60c5c183d5eb454c4c9d00f32ebedc624862a275072da44d8a32197682169d868ba2af7111c67bcc48dffa2b7a98e973d1d36230cf75c00b294735425c6e19e700be3849ffd71a262c90202eb8d66a5d9b57afbb719f70c44a0fe06c3cb6ba83f81eac7afc81f9b00db1a6ebd539db0450aabcf689aa8a77e3c933625037c580a9da57c8a44afa6e60703031bbda0b2e78fc13a749b2cc3c96964a41d407ac281defe5b0720b0de1d48bc7bf9d49d973a1c8009bee0174f6a21d29851972df6a5b52b01a763402b1afad0088d054b2517ab1e7b9f1cdcc67d0311ae0ec2e0af7ba6e42a78d014b54a176a8a78c8d75f16c8ee9868a69c5ace84d7c1a8fd5d717edce55df179c517f30943b60ed5ca0b9d95838256b611c1a57f7628463b426b52c27666c9853f96ee389a6f0196bebb11286b1279c7ba1c40250c7f7002f24eab5cc8ffad3bdb064fdd09870a795533531afe7860d63d5e492b35a140520d0506c0fff97b040e49801d93ca1fb8fb96c18c73b252266c813610e1d1420a962f766da414f6551eda1e334c05aa649af12385f833c422480e7fc35dece55e8a4d93343772c50361f567631954b8710407383eca8c131ea20bdd10f2e15c489498d06d87e92c8e7c95a8cd33cec48170feadaf52e33504932d365f7605ad29633cf94a03cd00d3490e90d076f4c4de628254a02c9db615e9664dcd5d47a9f53bfce49c164c151c85e130d1bacb7656fce9310f0a631acc88ed0a93dfad817d648f37ecd685f2b3aab65aa1237782a88fefa327d0c320bb2e20f843c246fc5564610a3f9af1141d10e236466d7e294d62e53cc4a20654286882199b18937ebd514b4faf233bc7253af228293a788d3e18318b20f8407c5548e6eca1a50beb79816440ec8384cec9e3310f35b3a97ad0a1d33cbc80b10c5255c17e818771dc8c031afd171a882145d4bac781d6396a5c0463f30e3ffe9ccc1fb6a66569ed102429339922f67a4432a9b2d6e78fa034e9f8e9937c2cf083c525eac23bf368d240e97b8c432bdd27e4ab8934495281c35ddc4abcba8488682d970267f57494354f90f461530b33be76f3f6aefa39472c378c66197495d53c3c6bf013136a0c62a45da2ae5c00b1d65ae793d7ea9c6cb2dca27c2a46687592cf7a27c97c4f323a6347fb96874249933570683852ce4b1fd3a48b39e8d7f3a7b077ef770e08166b76cee1b21222937019306b9b5d41276938c8eed0d32189e1e8e6d0719e4180b3cf997b040187b1c5abec272f8710b6a2aa24a29cbc0f0d4c88d633560ba533ac6d2f5d3ff5ac3dfce758a59e781881eb21bf5635fb8f7b6e6ea42de60d23169b77510b24f2f7ab029b159fc43a3f79961bbafac00cd558a0b0b3efc3c8c8c1badb097f474781235592af441e1e419dcd7d320d017486efff7fe32b4c822647d05d9b6f7ef42d598bca230e65715a3d054946c9232bdf2e526072c11791eb859fc0c05cd3a15db253a8c204bd56e23e9dd392fb41f14f45c679882df35df0498616099bc63e136948dbce0af830611400ace59cabb325085f8cabbe2595aa68304bd089274034fd103d91b8b121d97e6d586fffe0cc853d6009064aff7b0ac294cdc7f0dbb759144d9c9f41819505c42933bf4ca2d4c4b87ce3ccd46ae1de1d0c170b2ed227ad231a6d7b0c79c379ce811f525c21d1fc005655796230b70b974f4c6d0ef569274690a950cc472075b044b3a8ec2c2d3364004b82024179462af327700bd74381a41283f1b325877233a26cbe462bd8089d75bb541dd5a5801e19c0883f141c0cb825c43abaad22cb80a3e4c19e7dbef2ba159b80c973df6e7a513e7ceffc29a623510c1359b89742207f98aa63d900a1d18789938440b0bfb47f874f1f4e7dce772a71f2bc6755dfb3a76250b6465ab67b96efee36007cc4a653919146ffa6f6e37f53834ab86edcd6afccb1f9fdbd1561297c2da4dc2b3e4c12cafb1e5bf17e5b9847acde259bd7bdaf4749f247443cfbd3b7b468bdd0c74027713f45d3f52e67fdfd5c0537393cedf0a0923517ba1b54d3924ce21a81d9e5454ff1147e44757c2986b104cf81de64d0083b4dd216e3193f8779d26a98a1398fee2ebcedb3ef091fec62a189522fe8c527ca0cb7e640de3cf8c757cedabb1ea0c1b9ee4bd805f574ce50f295fe277b3fd926be3aa3977b16d9e210b7d049570804eff6816569f5552b2b4503a34904861c294cecd18246e414fbe72271690d0b8907f1bb6a23f77426cdb1a2824e7d31b1845093d55dcde71d9d3f3e9dadb01132c1dfba73a44245c9fe53b76aa9d9efaa6ac472cec54953f2149aec93f47c97702995ab5b7f7919fb80eafbbe59cc1fb5c64d1f9b3734c52065903c15e56dd3a8d310205abd75d7a1c2bc992ee4d7ed1d0ddb08f8fd8de499ab719ad1a17d39d139b9855ca72b82754b0e03f400474da54fe1d0f381d5852fc1b08fca546332980907052b3b20a5cec90b77706cda7d3f3ad191b26c5bfcecc0dd83577f3bffd046ac2465096b3ba805311b48994c2e031ddbb047e85c5aee3091a9918576b7ace81c1761fa3814779639413d809e1aa0e10c13c4d96a30d72d6cce59ce3c2c061800906e75a4dad5c8116e94b50b69b9df23c9b3f7a9b2c844a35722a0684db9f0a87ca08d839211c84a61fa1e4194d2d14f8ead3dc9ddd693722315d50b086c8a56fe18f22655675bdd222eb4640531e402964d3cf6f2bd8fd19bbb72d9436ed504baee0261a6b7dcdce61bd98cc0246f296ae6d65465b5d7d3296dc548698e540d720fec7cd177e453e077a84149fbcb37769acdd0a7b02a27293230130238c39be35f5f2a1d220df74c6787f3ba8c8a405b32171ee86a3776dc4eb0944bac850ec6b02a6a4948e1f806c0456fdc92056e564fb9ed0d888a2fc2f52dee8c2f179c2025c401e31bf2f0237806658ee2eaba330a8b29bf9e49f0d1e277007c396ddebff2cdf946a378b6cefe329363f602dfe6e14cb2ad923d96ec29b365cd23981b0bcfb97c7803bada918e9de04164783b5c041ba45d7432801aab51164684c952b4f8a292f5092ba7157c1a6b1731a96728706fd63b414e8e5e8b2bbffd0d239f6cca44a12dc06f2253ea38a49ad7bf68ea18abf97f43f71b6a83cbeacf920419ad0f292c2e64199f4dd337a4e2c442c6cc4759307ef602c0f7d4e44fc163816692e613e7cc38ab25d5830e5fc8c885d3371a94244a82b23a0d21c55b9c8d9cbaab18b7fec0bb16c0a5b1169da159879e07c43e1f03f4ca8cd9b83d8f31165b9abb0d7b4c5258869e23c33c6b93dc10e89fb20b4931b4cc72ca77eb48fd87f9efe57e3b20f87899b1613ebce44fa71aff912c5ebad617810c1e3e2a2263aaa23744f05c885ab2d358df8565e168db0f5852e42c046aa8a5647c16f5458d29808f9d463c201bf3bd73bdab396bc73780ed178e52d37a2265e9f0e3b846613f3239d5ae254abc0352bd1313869579cc30fd536463f7797263c6550452865e9b803c19679c3e1b478e591588d560cd90d192c6dac906f2b1d64ca522de40017d2b40efbe7daea7cac324ffbc48f981a56627b3cfed16955c0a46d1486c41be9ddd40b1398c4aec275fa845d6ae95800bb6f7a1816d1db4a89e402e6b09702c0557099de4311f86e858ab0481f9777b0c4dc23588ee230c7c7fafd053e63ea45767f447eedc186b4fac08ea426b95c587d845220c8d239b2fff65f021d30890c4b5d1afbb96a803c80f97dc53adf6c47918f8870edd5a00e4d2964e0d63f20070672f8e16e60f206da8c8dc727c743877d3c38a186febbe65e48f6624abb5a5350640dfe5879986e2d934d823771c3c741f292b1250c2dce99a4ed6c67943b911d73ccd0ce0ec0b344d0544e2e493fac6c6dc30351bf9b25dc7a90466af1be586e3868b696dce002e58fbc8cf8df571bad443b14f94a8eff64921b02b7c35f6b534d2e1f8611ae7047e6e2109fcf7297e06b7695d32fb8ee332ba3c11c16e3784255406cabd8b81ce37dc13661fec446ecc1340e724a00589a9407ff8c1baeb0c72d0b84960ba5ba7924532dea3af073a2a9f1edc1326ab1d79b93abf9e08235242835dd9fb4ddeb1e0952716cf74521852bda5edda9a9cce54e94009e2ef1d1003d405f24b2fa28782f6598a68f7ce1168f6e1895017c3ece06340b7cb7a0c2267b931c5495864582755ce2318fb6cb024977d2e905db107fee762f255eac6debb5419779abb75b04269c43ca7e22eb87a3a10e9114b84a098c92c3a3871cd7b5654127c6527ed7fd185443dd2764376640b14de4cd7e0760849ef7105ff34a3f4b9f1e68a40ac42a36c3546b0e5f227a2983755efea8d5acad36273905b82a9aa202ef59b5e431d4c483301828f0f1926ec3edfd", 0x1000}], 0x3, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x34}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x30}}, {{&(0x7f00000005c0)=@sco={0x1f, {0x80000000, 0x4, 0x1, 0x100, 0x7, 0x530f9b3d}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000640)="e03da59e404cae7afe67cf21f002086eb79a911e091d6fd5172f569597b39816dfb5ae2395ce41557ac1237635a3fc91d5f2615a0e5cda1bb576ff5caa5ac5d8101d46789b5cee8e47853be2787912ba9b01", 0x52}], 0x1}}, {{&(0x7f00000006c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @empty}, 0x3, 0x3, 0x0, 0x4}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000740)="ee07c7268239dd1ff37b9fff377ab59c743e09c7", 0x14}], 0x1}}, {{&(0x7f0000002800)=@ethernet={0x306, @broadcast}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002880)="a36817a32be9a7a07d9646f951831eb1eda500fc657178b125975ea553aff5dac1ab640bee22d7815f2afa2559c9de1de9653d39c8ce717ec3db3610b666775b2c3fa7ec478fee8f8a514161f01b036fa84c41f8d8a9659d0539be4390b9695d280b4f1e151478ca2293e60beb256796e2e490", 0x73}, {&(0x7f0000002900)="cd", 0x1}, {&(0x7f0000002940)="c62d7b68702eb2c45d9423cf46c6a6e3b9a82bd9e710f4e676a420deec04779c5247cf8e44cd8d129207a43a470e35457c553b11cc79658e8e53e47157db212c037c23dae63627aa9dfd52df0063a57b3ed34ae167433235eb01ad03", 0x5c}], 0x3}}], 0x5, 0x4040000) read(r1, &(0x7f0000000040)=""/230, 0x20000346) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0x7ff, 0xf, 0x3}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:21 executing program 2: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') socket$inet6(0xa, 0x3, 0xd14) read(r0, &(0x7f0000000040)=""/230, 0x20000346) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:21 executing program 2: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') socket$inet6(0xa, 0x3, 0xd14) read(r0, &(0x7f0000000040)=""/230, 0x20000346) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:21 executing program 3: statfs(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)=""/98) unlink(&(0x7f0000000240)='./file0\x00') mknod$loop(&(0x7f00000007c0)='./file0\x00', 0xfffffffffffffffc, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x101, 0xf, 0x4, 0x0, {0x0, 0x7530}, {0x1, 0xb, 0x6, 0xf9b, 0x0, 0x1ff, "9fdb4709"}, 0x5, 0x4, @planes=&(0x7f0000000000)={0x10001, 0x7, @fd=r0, 0x3}, 0x4}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getgroups(0x1, &(0x7f0000000540)=[0xffffffffffffffff]) lchown(&(0x7f0000000340)='./file0\x00', r1, r2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x1, 0x2, 0x7, 0x6, 0x0, 0x8000, 0x1800, 0x2, 0xfffffffffffffffd, 0x4, 0xfffffffffffffffe, 0x4, 0x8, 0x4, 0x2, 0x10001, 0x400, 0x2, 0x1ff, 0x7, 0x8000, 0xfff, 0xff, 0x9, 0x8f3, 0x0, 0x10000, 0x1ff, 0x4, 0x81, 0x5, 0x0, 0x8, 0x401, 0x6a, 0x5, 0x0, 0x2, 0x3, @perf_bp={&(0x7f0000000040), 0x2}, 0x8000, 0x1, 0x1, 0xf, 0x7, 0x3}, r1, 0x3, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:21 executing program 2: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') socket$inet6(0xa, 0x3, 0xd14) read(r0, &(0x7f0000000040)=""/230, 0x20000346) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:21 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') acct(&(0x7f0000000000)='./file0\x00') [ 260.960652] device bridge_slave_1 left promiscuous mode [ 260.966510] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.981880] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 261.003862] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 261.068573] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 261.084510] tmpfs: No value for mount option ' 3333ff00001a [ 261.084510] 36 team_slave_1 1 0 3333ffaaaa1a [ 261.084510] 36 team_slave_1 1 0 3333ffaff80e [ 261.084510] 25 veth0_to_bridge 1 0 333300000001 [ 261.084510] 25 veth0_to_bridge 1 0 3333ff00001b [ 261.084510] 25 veth0_to_bridge 1 0 01005e000001 [ 261.084510] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 261.084510] 26 bridge_slave_0 1 0 333300000001 [ 261.084510] 26 bridge_slave_0 1 0 01005e000001 [ 261.084510] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 261.084510] 33 veth0_to_team 1 0 333300000001 [ 261.084510] 33 veth0_to_team 1 0 01005e000001 [ 261.084510] 33 veth0_to_team 1 0 3333ff00001f [ 261.084510] 33 veth0_to_team 1 0 3333ffaaaa1f [ 261.084510] 27 veth1_to_bridge 1 0 333300000001 [ 261.084510] 27 veth1_to_bridge 1 0 01005e000001 [ 261.102932] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 261.203910] tmpfs: No value for mount option ' 3333ff00001a [ 261.203910] 36 team_slave_1 1 0 3333ffaaaa1a [ 261.203910] 36 team_slave_1 1 0 3333ffaff80e [ 261.203910] 25 veth0_to_bridge 1 0 333300000001 [ 261.203910] 25 veth0_to_bridge 1 0 3333ff00001b [ 261.203910] 25 veth0_to_bridge 1 0 01005e000001 [ 261.203910] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 261.203910] 26 bridge_slave_0 1 0 333300000001 [ 261.203910] 26 bridge_slave_0 1 0 01005e000001 [ 261.203910] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 261.203910] 33 veth0_to_team 1 0 333300000001 [ 261.203910] 33 veth0_to_team 1 0 01005e000001 [ 261.203910] 33 veth0_to_team 1 0 3333ff00001f [ 261.203910] 33 veth0_to_team 1 0 3333ffaaaa1f [ 261.203910] 27 veth1_to_bridge 1 0 333300000001 [ 261.203910] 27 veth1_to_bridge 1 0 01005e000001 [ 261.308543] Process accounting resumed [ 261.341498] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 261.364427] device bridge_slave_0 left promiscuous mode [ 261.369952] bridge0: port 1(bridge_slave_0) entered disabled state 14:11:22 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000009c0)={'team0\x00', 0x0}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000a00)={@remote, r1}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) [ 261.562590] device hsr_slave_1 left promiscuous mode [ 261.623911] device hsr_slave_0 left promiscuous mode [ 261.654323] team0 (unregistering): Port device team_slave_1 removed [ 261.678289] team0 (unregistering): Port device team_slave_0 removed [ 261.701346] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 261.754154] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 261.849069] bond0 (unregistering): Released all slaves [ 263.621379] IPVS: ftp: loaded support on port[0] = 21 [ 264.444032] chnl_net:caif_netlink_parms(): no params data found [ 264.483040] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.489437] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.496720] device bridge_slave_0 entered promiscuous mode [ 264.503947] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.510412] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.517313] device bridge_slave_1 entered promiscuous mode [ 264.533495] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.546462] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.564660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.571958] team0: Port device team_slave_0 added [ 264.577329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.584494] team0: Port device team_slave_1 added [ 264.589942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.597659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.652245] device hsr_slave_0 entered promiscuous mode [ 264.690379] device hsr_slave_1 entered promiscuous mode [ 264.735455] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 264.742494] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 264.756751] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.763148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.769770] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.776159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.806481] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 264.812963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.821168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.829347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.836817] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.843649] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.853862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 264.860272] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.881510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.889039] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.895432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.903066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.910759] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.917088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.924720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.932478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.940196] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 264.954267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.965515] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 264.976205] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 264.982909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 264.989802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.006375] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 265.017079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 265.181581] device bridge_slave_1 left promiscuous mode [ 265.187107] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.241557] device bridge_slave_0 left promiscuous mode [ 265.247823] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.273374] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 265.281198] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 265.287907] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 265.294711] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 265.303314] hid-generic 0000:0000:0000.0020: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:25 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:25 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) 14:11:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:25 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9, 0x8000) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xfff, 0x4000) getpeername$netlink(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:25 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:25 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 265.383503] device hsr_slave_1 left promiscuous mode [ 265.416479] device hsr_slave_0 left promiscuous mode [ 265.431139] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 265.437884] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 265.463723] team0 (unregistering): Port device team_slave_1 removed 14:11:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = accept(0xffffffffffffffff, &(0x7f0000000280)=@hci, &(0x7f0000000140)=0x80) connect$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000300)={0x2, 'lapb0\x00', 0x1}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x101, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000900)="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") ioprio_set$uid(0x3, r2, 0xf7b) [ 265.487145] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 14:11:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x2, {0x100000000000000, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x200003c0}], 0x1}}], 0x1, 0x0) mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) fsetxattr$security_ima(r0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "e877e0d078de582f35f1a6a547c50f81"}, 0x11, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$cont(0x9, r2, 0x1, 0x1000000) read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 265.533676] team0 (unregistering): Port device team_slave_0 removed [ 265.541008] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 265.547872] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 265.558267] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 14:11:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 265.605023] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 265.609502] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on syz1 [ 265.670584] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 265.705791] tmpfs: No value for mount option ' 3333ff00001a [ 265.705791] 36 team_slave_1 1 0 3333ffaaaa1a [ 265.705791] 36 team_slave_1 1 0 3333ffaff80e [ 265.705791] 25 veth0_to_bridge 1 0 333300000001 [ 265.705791] 25 veth0_to_bridge 1 0 3333ff00001b [ 265.705791] 25 veth0_to_bridge 1 0 01005e000001 [ 265.705791] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 265.705791] 26 bridge_slave_0 1 0 333300000001 [ 265.705791] 26 bridge_slave_0 1 0 01005e000001 [ 265.705791] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 265.705791] 33 veth0_to_team 1 0 333300000001 [ 265.705791] 33 veth0_to_team 1 0 01005e000001 14:11:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000080)) [ 265.705791] 33 veth0_to_team 1 0 3333ff00001f [ 265.705791] 33 veth0_to_team 1 0 3333ffaaaa1f [ 265.705791] 27 veth1_to_bridge 1 0 333300000001 [ 265.705791] 27 veth1_to_bridge 1 0 01005e000001 [ 265.836542] hid-generic 0000:0000:0000.0022: hidraw0: HID v0.00 Device [syz1] on syz1 [ 265.920465] bond0 (unregistering): Releasing backup interface bond_slave_1 14:11:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) 14:11:26 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:26 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 265.975395] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 266.115979] tmpfs: No value for mount option ' 3333ff00001a [ 266.115979] 36 team_slave_1 1 0 3333ffaaaa1a [ 266.115979] 36 team_slave_1 1 0 3333ffaff80e [ 266.115979] 25 veth0_to_bridge 1 0 333300000001 [ 266.115979] 25 veth0_to_bridge 1 0 3333ff00001b [ 266.115979] 25 veth0_to_bridge 1 0 01005e000001 [ 266.115979] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 266.115979] 26 bridge_slave_0 1 0 333300000001 [ 266.115979] 26 bridge_slave_0 1 0 01005e000001 [ 266.115979] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 266.115979] 33 veth0_to_team 1 0 333300000001 [ 266.115979] 33 veth0_to_team 1 0 01005e000001 [ 266.115979] 33 veth0_to_team 1 0 3333ff00001f [ 266.115979] 33 veth0_to_team 1 0 3333ffaaaa1f [ 266.115979] 27 veth1_to_bridge 1 0 333300000001 [ 266.115979] 27 veth1_to_bridge 1 0 01005e000001 14:11:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 266.254635] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 266.285035] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 266.306356] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 266.339004] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 266.358388] hid-generic 0000:0000:0000.0023: hidraw0: HID v0.00 Device [syz1] on syz1 [ 266.467947] bond0 (unregistering): Released all slaves [ 266.513923] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 268.321303] IPVS: ftp: loaded support on port[0] = 21 [ 269.383056] chnl_net:caif_netlink_parms(): no params data found [ 269.419970] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.426466] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.433458] device bridge_slave_0 entered promiscuous mode [ 269.440433] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.446835] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.453869] device bridge_slave_1 entered promiscuous mode [ 269.476668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.486091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 269.508342] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 269.515626] team0: Port device team_slave_0 added [ 269.521382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 269.529070] team0: Port device team_slave_1 added [ 269.534585] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 269.542166] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 269.602451] device hsr_slave_0 entered promiscuous mode [ 269.640371] device hsr_slave_1 entered promiscuous mode [ 269.680584] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 269.689843] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 269.703082] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.709431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.716250] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.722653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.754073] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 269.760237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.768934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.781271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.788387] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.795360] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.804521] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.811044] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.822942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.831967] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.838320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.851760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.859318] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.865705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.878792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.887489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.901808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.909361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.917153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.925951] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 269.932202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.946925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 269.957609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.020567] device bridge_slave_1 left promiscuous mode [ 270.026085] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.071228] device bridge_slave_0 left promiscuous mode [ 270.076750] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.094548] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 270.101987] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 270.108760] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 270.115601] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 270.129394] hid-generic 0000:0000:0000.0024: hidraw0: HID v0.00 Device [syz1] on syz1 14:11:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='netdevsim0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 14:11:30 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:30 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) 14:11:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:30 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000180)='self\x00') 14:11:30 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/145) [ 270.243000] device hsr_slave_1 left promiscuous mode 14:11:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 270.274028] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 270.288738] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 270.299248] tmpfs: No value for mount option 'self' [ 270.315134] device hsr_slave_0 left promiscuous mode 14:11:30 executing program 3: mknod$loop(&(0x7f00000007c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000346) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') 14:11:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) [ 270.329174] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 270.369138] team0 (unregistering): Port device team_slave_1 removed [ 270.411563] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 270.429848] tmpfs: No value for mount option ' 3333ff00001a [ 270.429848] 36 team_slave_1 1 0 3333ffaaaa1a [ 270.429848] 36 team_slave_1 1 0 3333ffaff80e [ 270.429848] 25 veth0_to_bridge 1 0 333300000001 [ 270.429848] 25 veth0_to_bridge 1 0 3333ff00001b [ 270.429848] 25 veth0_to_bridge 1 0 01005e000001 [ 270.429848] 25 veth0_to_bridge 1 0 3333ffaaaa1b [ 270.429848] 26 bridge_slave_0 1 0 333300000001 [ 270.429848] 26 bridge_slave_0 1 0 01005e000001 [ 270.429848] 26 bridge_slave_0 1 0 3333ff3f6d0e [ 270.429848] 33 veth0_to_team 1 0 333300000001 [ 270.429848] 33 veth0_to_team 1 0 01005e000001 [ 270.429848] 33 veth0_to_team 1 0 3333ff00001f [ 270.429848] 33 veth0_to_team 1 0 3333ffaaaa1f [ 270.429848] 27 veth1_to_bridge 1 0 333300000001 14:11:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf4c9a57f9ffffffffffffff8a34e6bdc4dc1af6fa6e28b5a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03df8b8106b50b25f50ea0244c885ccee2597b27facec8d37a9f94ed022decabb7e6a2191f93df433088502a6caa77c280adec889cd58fb0a116c7b16e0e29abffbe60bc5a3a55c76ccb25da2ca354edbf9c6a6de5aff31891da437945a43c02a3503ae3498eed24e10260f0702b9d82db109cff6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000000c0)=""/110) getpgrp(r1) [ 270.429848] 27 veth1_to_bridge 1 0 01005e000001 14:11:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:31 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x80) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1) r2 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x2100) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fff, 0x220000) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0xc}, @remote}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:11:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb50f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b351859bb7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 14:11:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x51de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0xfffffffe, &(0x7f00000006c0)="b9ff0302000d698cb89e40f02cea", 0x0, 0x402}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x16, 0xb9, &(0x7f0000000040)="b5fdd68929846412b031e04f7090f782728d394244f4", &(0x7f0000000080)=""/185, 0x48b}, 0x28) [ 270.701966] ------------[ cut here ]------------ [ 270.706776] kernel BUG at mm/slab.c:4427! [ 270.723159] hid-generic 0000:0000:0000.0025: hidraw0: HID v0.00 Device [syz1] on syz1 [ 270.734562] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 270.739951] Modules linked in: [ 270.743146] CPU: 0 PID: 9946 Comm: syz-executor.1 Not tainted 4.14.136 #32 [ 270.750155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.759512] task: ffff88809122c5c0 task.stack: ffff8880954c8000 [ 270.765576] RIP: 0010:__check_heap_object+0x58/0x5a [ 270.770586] RSP: 0018:ffff8880954cfbc0 EFLAGS: 00010246 [ 270.775948] RAX: 0000000000000001 RBX: 00000000000003a3 RCX: 0000000000000015 [ 270.783216] RDX: 00000000003fda7d RSI: 00000000000003a3 RDI: ffff888050fffff3 [ 270.790489] RBP: ffff8880954cfc00 R08: ffff8880aa802c80 R09: ffff888050c00580 [ 270.797760] R10: ffff88821fff8010 R11: 0000000000000001 R12: ffff888050fffff3 [ 270.805036] R13: ffffea0001430000 R14: 0000000000000001 R15: ffffea0001430000 [ 270.812313] FS: 00007fa52fd4f700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 270.820539] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.826428] CR2: 0000000000711934 CR3: 00000000984bf000 CR4: 00000000001406f0 [ 270.833697] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.840966] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 270.848233] Call Trace: [ 270.850855] ? __check_object_size+0x14c/0x2ab [ 270.855452] bpf_test_finish.isra.0+0x9a/0x150 [ 270.860038] ? bpf_test_run+0x330/0x330 [ 270.864017] bpf_prog_test_run_skb+0x5af/0x9a0 [ 270.868609] ? bpf_test_init.isra.0+0xe0/0xe0 [ 270.873102] ? fput+0xd4/0x150 [ 270.876298] ? __bpf_prog_get+0x153/0x1a0 [ 270.880453] SyS_bpf+0x749/0x38f3 [ 270.883946] ? retint_kernel+0x2d/0x2d [ 270.887833] ? bpf_test_init.isra.0+0xe0/0xe0 [ 270.892325] ? bpf_prog_get+0x20/0x20 [ 270.896130] ? trace_hardirqs_on_caller+0x400/0x590 [ 270.901265] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.906039] ? check_preemption_disabled+0x3c/0x250 [ 270.911056] ? retint_kernel+0x2d/0x2d [ 270.914946] ? bpf_prog_get+0x20/0x20 [ 270.918745] ? SyS_bpf+0x10/0x38f3 [ 270.922280] ? bpf_prog_get+0x20/0x20 [ 270.926079] do_syscall_64+0x1e8/0x640 [ 270.929964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.934809] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.939998] RIP: 0033:0x459829 [ 270.943180] RSP: 002b:00007fa52fd4ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.950892] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 270.958170] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 270.965526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 270.972797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa52fd4f6d4 [ 270.980068] R13: 00000000004bfb92 R14: 00000000004d1758 R15: 00000000ffffffff [ 270.987346] Code: e8 41 39 40 24 76 24 41 0f af 40 14 4c 01 c8 48 29 c7 49 63 40 74 48 39 f8 72 08 48 29 f8 48 39 f0 73 05 49 8b 40 58 c3 31 c0 c3 <0f> 0b 44 89 e9 48 c7 c7 70 cf 41 87 89 75 d4 4c 8d 45 cc 81 e1 [ 271.006550] RIP: __check_heap_object+0x58/0x5a RSP: ffff8880954cfbc0 [ 271.025547] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): kobject_uevent_env [ 271.041954] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0025' [ 271.069166] team0 (unregistering): Port device team_slave_0 removed [ 271.076389] kobject: 'hidraw0' (ffff8880555bc050): kobject_uevent_env [ 271.086178] kobject: 'batman_adv' (ffff8880a0566f80): kobject_uevent_env [ 271.093178] kobject: 'hidraw0' (ffff8880555bc050): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0025/hidraw/hidraw0' [ 271.100263] kobject: '0:41' (ffff8880a4a44010): kobject_uevent_env [ 271.115565] kobject: 'batman_adv' (ffff8880a0566f80): kobject_uevent_env: filter function caused the event to drop! [ 271.118586] kobject: '0:41' (ffff8880a4a44010): fill_kobj_path: path = '/devices/virtual/bdi/0:41' [ 271.136684] kobject: 'hidraw' (ffff888091ee4880): kobject_cleanup, parent (null) [ 271.145067] kobject: 'batman_adv' (ffff8880a0566f80): kobject_cleanup, parent (null) [ 271.155624] kobject: 'hidraw' (ffff888091ee4880): calling ktype release [ 271.163703] kobject: 'batman_adv' (ffff8880a0566f80): calling ktype release [ 271.172462] kobject: 'hidraw': free name [ 271.178509] kobject: (ffff8880a0566f80): dynamic_kobj_release [ 271.180948] kobject: 'hidraw0' (ffff8880555bc050): kobject_cleanup, parent (null) [ 271.184569] kobject: '0:41' (ffff8880a4a44010): kobject_cleanup, parent (null) [ 271.206658] kobject: 'hidraw0' (ffff8880555bc050): calling ktype release [ 271.207726] kobject: 'batman_adv': free name [ 271.217398] kobject: 'hidraw0': free name [ 271.222275] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): kobject_uevent_env [ 271.230238] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0025' [ 271.232216] kobject: '0:41' (ffff8880a4a44010): calling ktype release [ 271.245932] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): kobject_uevent_env [ 271.257021] kobject: 'rx-0' (ffff8880973bc9d0): kobject_cleanup, parent ffff888098f98748 [ 271.257173] kobject: '0000:0000:0000.0025' (ffff888059a52fb8): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0025' [ 271.265345] kobject: '0:41': free name [ 271.281050] ---[ end trace 2b757fa3158fc676 ]--- [ 271.281515] kobject: 'rx-0' (ffff8880973bc9d0): auto cleanup 'remove' event [ 271.286294] Kernel panic - not syncing: Fatal exception [ 271.293363] kobject: 'rx-0' (ffff8880973bc9d0): kobject_uevent_env [ 271.299898] Kernel Offset: disabled [ 271.309946] Rebooting in 86400 seconds..