31:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:31:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:31:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x161180, 0x0) signalfd(r2, &(0x7f0000000180)={[0x8]}, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1450.213235][T26882] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000007" or missing value 11:31:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:31:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1450.778251][T26872] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:31:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:31:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6c00000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:31:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x4}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:31:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c650a77c75624379dbcc200c16a604000000d781c413ec926a7cffdae44c2f167346b9292f4d1925234c6d5739b6fdbe18b37468c98fb283f7"]) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000400)="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") sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:31:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 1451.036419][T26897] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:31:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x3b3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:31:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:31:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1451.841262][T26907] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000007" or missing value [ 1452.028712][T26916] cgroup1: Unknown subsys name 'perf_event' [ 1452.035150][T26916] cgroup1: Unknown subsys name 'net_cls' [ 1452.308582][T27023] cgroup1: Unknown subsys name 'perf_event' [ 1452.315435][T27023] cgroup1: Unknown subsys name 'net_cls' [ 1452.323451][T27025] cgroup1: Unknown subsys name 'perf_event' [ 1452.335806][T27025] cgroup1: Unknown subsys name 'net_cls' 11:31:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socket$pppl2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RLCREATE(r5, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x80, 0x4, 0x6}, 0x3}}, 0x18) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)={0x2, 0x400000000000003, 0x0, 0x9, 0x1f, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x17, 0x2b, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_x_sec_ctx={0x18, 0x18, 0x1, 0x6, 0xb8, "293559a81cb5cffa2af38b0af17378bf7f1a13fcc4e9503c730df887a2cc85d9205c951b9026982dcdc885d4df8b2c8c7053a2d499a9304583c2b79c7f034a0fd53d1b6bc21213c7d207898cf0d0598b603c953210d1f350eddb2b78571409749edd5671dfe1b01f524a9271a4cdc4009f79f2c8c40d5efc90cd2ab07b297fac085bed6fe211df47d23258bb9404a67602799d7dc1426067cd76cc3fa2d87fd88ed802790ffb0b99a3f25d462e67e2b21d3f983e3e7cc38e"}]}, 0xf8}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:31:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 1452.659643][T27199] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000007" or missing value 11:31:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1454.625991][T28170] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:31:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6c85e31876ddf7b1dcfd2ca59ea0500525ec6aa15c5bc1219bc3939b92617722a16c90930c7d3524ed9ffcdfa380d2d54ca2f838f85ae4a8316264f18dde0b09bc9fd8e9028cdfd7ce67f68d67726dbb04fb620b6d3241453906775cf2c7f5385a7e217e2ad3f46445fb2e6ec6c97a2278681cfbdf3f4b86b2783abbfffd58526a1e69c1af65e65512f07ffc36cb0bb1d6cbb61123f0a767085964d5b4", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000909000000000000000000000005000600000000000a70460922392e06cf0000000000000000000000000000000000ffff0000000000000000000000000200010000000000"], 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:31:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 1455.011924][T28178] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1455.393973][T28169] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x5}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7400000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xf) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x6}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x7}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:32:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000000}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000480)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r11, 0x0) r12 = getegid() pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000680)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r16, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r19, 0x0) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r21, 0x0) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r23, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r26, 0x0) r27 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r28, 0x0) r29 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r30, 0x0) write$FUSE_DIRENTPLUS(r6, &(0x7f00000009c0)={0x510, 0xfffffffffffffffe, 0x4, [{{0x6, 0x3, 0x7f, 0x401, 0xa885, 0x3, {0x0, 0x9, 0x10001, 0xfff, 0x2, 0x4, 0x4, 0x380, 0x3, 0xb, 0x5, r7, r8, 0x2, 0x40}}, {0x0, 0x3, 0x8, 0x400, 'group_id'}}, {{0x1, 0x2, 0x4, 0x1, 0x6, 0x7, {0x4, 0x3, 0x4, 0x9, 0x80000001, 0x1, 0x6, 0x2, 0x5, 0x10001, 0x4, r9, r11, 0x20, 0x4}}, {0x2, 0xcc, 0x8, 0x9, 'group_id'}}, {{0x4, 0x1, 0x7, 0x8, 0x80000000, 0x8f1, {0x1, 0x2, 0x3, 0x3ff, 0x9, 0x9, 0x1, 0x80000001, 0x8, 0x1000, 0x5, 0xee00, r12, 0x0, 0x15f}}, {0x0, 0x4, 0x8, 0x5, 'security'}}, {{0x6, 0x1, 0x4, 0x0, 0x4, 0x7, {0x3, 0x0, 0x800, 0x3f, 0x1d1, 0xfffffffffffffff7, 0x5, 0xc7, 0x8001, 0x101, 0x5, r14, r16, 0x1}}, {0x1, 0xfffffffffffffffe, 0x0, 0x6}}, {{0x3, 0x1, 0xa6c, 0xfffffffffffffff9, 0x9, 0x1, {0x5, 0x800, 0x1, 0x306c, 0x2, 0x7, 0x2, 0x2, 0x0, 0x8001, 0x2, r17, r19, 0x40, 0x40}}, {0x2, 0x80, 0x1, 0x0, '\''}}, {{0x6, 0x2, 0x100000001, 0x4, 0x30000000, 0x290700ea, {0x5, 0x7ff, 0x2, 0xfff, 0x80000001, 0x3, 0x7, 0x8, 0x3, 0x1, 0x2, r21, r23, 0x81, 0x7}}, {0x5, 0x10000, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x0, 0x1, 0xffffffff, 0x5, 0x6, 0x1, {0x2, 0x5bf3d08f, 0x941d, 0x0, 0x8, 0x9, 0x0, 0x1, 0x1, 0xa39, 0x9, r24, r26, 0x9, 0xa88}}, {0x6, 0x722c4f86, 0x1, 0x9, '/'}}, {{0x5, 0x0, 0x5, 0x5, 0xffff2d77, 0x5, {0x4, 0x39, 0x9, 0x9, 0x9e, 0x7fffffff, 0xffff, 0x8000, 0x10001, 0x4, 0x5, r28, r30, 0x0, 0x7ff}}, {0x6, 0x7, 0x1, 0x80000, '\\'}}]}, 0x510) [ 1455.920950][T28198] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xf00) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:32:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getitimer(0x2, &(0x7f0000000100)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x2008}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1456.630662][T28210] cgroup1: Unknown subsys name 'perf_event' [ 1456.637252][T28210] cgroup1: Unknown subsys name 'net_cls' [ 1456.775909][T28230] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000008" or missing value [ 1456.873262][T28246] cgroup1: Unknown subsys name 'perf_event' [ 1456.880194][T28246] cgroup1: Unknown subsys name 'net_cls' [ 1456.880721][T28247] cgroup1: Unknown subsys name 'perf_event' [ 1456.895487][T28247] cgroup1: Unknown subsys name 'net_cls' 11:32:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 1459.295749][T29462] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) ioctl$void(r4, 0x5451) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:32:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1459.845212][T29467] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000008" or missing value 11:32:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x4000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a00000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) 11:32:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x8}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x8cffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1460.044380][T29462] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x9}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xa}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="8ccfce0e92a9c5e9d5412dfe8e693d2c726f6f746d6f64653d30303030303030303030303032303030303034303030757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1460.634073][T29487] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006ŒÏÎ’©ÅéÕA-þŽi=" or missing value 11:32:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) 11:32:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x40000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r5 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) setsockopt$inet6_buf(r5, 0x29, 0x6, &(0x7f0000000480)="796041d893ce77f2ca4022b3a6d2c0ddf73504783a9351a476e30514f5b4604b54810360d0e33b746d85d6f6e36461870abedaa754c9e1ef1949cd5b0232aee44bc9f9ba65225b7cbb19a2fe0897f0e08153f995d5ba08dc1429b4bdf1a4305327f02d267c0491954c0363d8c9cfbcf7098c11dc5207bc455dd6ea78873bca1a3882fb5e15956df5730941d5a59e2095bae324db17669597628c40a911c95a90052ac19515a4ad92d19414c062a8f542cf7a074f40052dad8b45ea4bb390ed150690f1", 0xc3) [ 1461.437374][T29503] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1461.451843][T29504] cgroup1: Unknown subsys name 'perf_event' [ 1461.458304][T29504] cgroup1: Unknown subsys name 'net_cls' 11:32:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) [ 1461.664599][T29573] cgroup1: Unknown subsys name 'perf_event' [ 1461.671836][T29573] cgroup1: Unknown subsys name 'net_cls' [ 1461.680290][T29578] cgroup1: Unknown subsys name 'perf_event' [ 1461.689997][T29578] cgroup1: Unknown subsys name 'net_cls' 11:32:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x9f, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:32:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x1000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1462.258550][T29823] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1464.015037][T30757] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}, 0xfffffdef}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1464.564225][T30764] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x97ffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1464.765159][T30755] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xb}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x2000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xc}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x9c00000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xd}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x9e00000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@rand_addr="d99b196d9ed9e424e7946bca326ceeb7", 0x5, 0x0, 0x3, 0x0, 0x0, 0x4}, &(0x7f0000000180)=0x20) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:32:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x402e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1465.374159][T30782] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x8000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x402e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1466.053108][T30793] cgroup1: Unknown subsys name 'perf_event' [ 1466.059491][T30793] cgroup1: Unknown subsys name 'net_cls' [ 1466.236996][T30861] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1466.282372][T30867] cgroup1: Unknown subsys name 'perf_event' [ 1466.300693][T30867] cgroup1: Unknown subsys name 'net_cls' [ 1466.310545][T30873] cgroup1: Unknown subsys name 'perf_event' [ 1466.320595][T30873] cgroup1: Unknown subsys name 'net_cls' [ 1468.469818][T32038] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x402e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xf000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xe00000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1469.223224][T32036] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xe}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa100000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa200000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa300000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x10}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x11}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x402e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x40000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1470.167554][T32066] cgroup1: Unknown subsys name 'perf_event' [ 1470.173726][T32066] cgroup1: Unknown subsys name 'net_cls' [ 1470.463858][T32191] cgroup1: Unknown subsys name 'perf_event' [ 1470.470321][T32191] cgroup1: Unknown subsys name 'net_cls' [ 1470.648279][T32268] cgroup1: Unknown subsys name 'perf_event' [ 1470.649802][T32269] cgroup1: Unknown subsys name 'perf_event' [ 1470.654546][T32268] cgroup1: Unknown subsys name 'net_cls' [ 1470.663736][T32269] cgroup1: Unknown subsys name 'net_cls' 11:32:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:18 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:32:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xeffdffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1473.273156][ T1256] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1474.028320][ T1252] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa400000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x12}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x22}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xfffffdef) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa500000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa600000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x22, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1475.013440][ T1281] cgroup1: Unknown subsys name 'perf_event' [ 1475.019910][ T1281] cgroup1: Unknown subsys name 'net_cls' 11:32:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xffffff7f) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1475.362961][ T1387] cgroup1: Unknown subsys name 'perf_event' [ 1475.369375][ T1387] cgroup1: Unknown subsys name 'net_cls' [ 1475.586001][ T1484] cgroup1: Unknown subsys name 'perf_event' [ 1475.592511][ T1484] cgroup1: Unknown subsys name 'net_cls' [ 1475.598729][ T1487] cgroup1: Unknown subsys name 'perf_event' [ 1475.607158][ T1487] cgroup1: Unknown subsys name 'net_cls' [ 1477.415790][ T2603] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x2, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1478.191309][ T2965] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x4000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x25}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1478.938537][ T2962] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa700000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf0ffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x2, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf6ffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x2e}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x48}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x100000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1479.880016][ T2989] cgroup1: Unknown subsys name 'perf_event' [ 1479.886214][ T2989] cgroup1: Unknown subsys name 'net_cls' 11:32:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x2, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1480.218888][ T3132] cgroup1: Unknown subsys name 'perf_event' [ 1480.225052][ T3132] cgroup1: Unknown subsys name 'net_cls' [ 1480.409341][ T3219] cgroup1: Unknown subsys name 'perf_event' [ 1480.416200][ T3219] cgroup1: Unknown subsys name 'net_cls' [ 1480.429814][ T3225] cgroup1: Unknown subsys name 'perf_event' [ 1480.438005][ T3225] cgroup1: Unknown subsys name 'net_cls' 11:32:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x20000200, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x200000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1483.251510][ T4654] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x20000200, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf9fdffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x800000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x4c}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1484.011900][ T4652] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfdffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x60}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x68}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1484.925649][ T4678] cgroup1: Unknown subsys name 'perf_event' [ 1484.932882][ T4678] cgroup1: Unknown subsys name 'net_cls' 11:32:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xf00000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1485.299179][ T4823] cgroup1: Unknown subsys name 'perf_event' [ 1485.305345][ T4823] cgroup1: Unknown subsys name 'net_cls' [ 1485.496924][ T4917] cgroup1: Unknown subsys name 'perf_event' [ 1485.500306][ T4918] cgroup1: Unknown subsys name 'perf_event' [ 1485.505983][ T4917] cgroup1: Unknown subsys name 'net_cls' [ 1485.509785][ T4918] cgroup1: Unknown subsys name 'net_cls' 11:32:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x48}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x7a}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:32:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x4000000000000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1487.995687][ T6340] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1488.150839][ T6349] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x35c, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1488.886328][ T6351] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x35c, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfeffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xeffdffff00000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x6c}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xff03000000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x74}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1489.161219][ T6370] fuse: Bad value for 'fd' 11:32:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x7a}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffff0f0000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x48}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}]}, 0x48}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1489.650249][ T6375] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1489.762384][ T6378] cgroup1: Unknown subsys name 'perf_event' [ 1489.768759][ T6378] cgroup1: Unknown subsys name 'net_cls' [ 1489.961437][ T6434] fuse: Bad value for 'fd' [ 1490.477854][ T6603] cgroup1: Unknown subsys name 'perf_event' [ 1490.484228][ T6603] cgroup1: Unknown subsys name 'net_cls' [ 1490.659239][ T6693] cgroup1: Unknown subsys name 'perf_event' [ 1490.665814][ T6693] cgroup1: Unknown subsys name 'net_cls' 11:32:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xffffff7f00000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xeffdffff00000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1492.305057][ T7569] fuse: Bad value for 'fd' [ 1492.606983][ T7610] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1493.136179][ T7645] fuse: Bad value for 'fd' [ 1493.367286][ T7649] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0xffffffff00000000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffff1f0000000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f00000003c0)={0x0, 'ip_vti0\x00', {}, 0x7fff}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x2000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) r6 = socket(0x15, 0xa, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r6, 0x891a, &(0x7f0000000240)={'team_slave_0\x00', {0x2, 0x4e20, @local}}) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x83, 0x0, 0x9, 0xe, 0x0, 0x0, 0x400, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x9}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffff7f00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1493.751555][ T7662] cgroup1: Unknown subsys name 'perf_event' [ 1493.764893][ T7662] cgroup1: Unknown subsys name 'net_cls' 11:32:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1493.977182][ T7690] fuse: Bad value for 'fd' 11:32:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$LOOP_GET_STATUS64(r6, 0x4c05, &(0x7f0000000340)) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1494.942995][ T7947] cgroup1: Unknown subsys name 'perf_event' [ 1494.949840][ T7947] cgroup1: Unknown subsys name 'net_cls' [ 1495.297592][ T8135] cgroup1: Unknown subsys name 'perf_event' [ 1495.304751][ T8135] cgroup1: Unknown subsys name 'net_cls' [ 1495.531325][ T8255] cgroup1: Unknown subsys name 'perf_event' [ 1495.540656][ T8255] cgroup1: Unknown subsys name 'net_cls' 11:32:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:32:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000340)={0x200, 0x1, 0x9, 0x9, 0x16, 0x88f}) 11:32:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1496.471988][ T8705] fuse: Bad value for 'fd' [ 1497.622735][ T9200] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000008" or missing value [ 1498.029271][ T9338] cgroup1: Unknown subsys name 'perf_event' [ 1498.035919][ T9338] cgroup1: Unknown subsys name 'net_cls' 11:32:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1498.408700][ T9410] fuse: Bad value for 'fd' 11:32:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffffff00000000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x422000, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000180)={0x9, 0x80000001, 0xfffffff3, 0x8001}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x20000, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x38, r6, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x302}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4$unix(r2, &(0x7f0000000680)=@abs, &(0x7f00000005c0)=0x6e, 0x80000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4(r7, &(0x7f0000000700)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x800) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r8, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/vmstat\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r9, 0x400454e2, &(0x7f0000000240)) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x80806, 0x1f) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffffffffffff0f, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x22, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) [ 1499.237766][ T9558] fuse: Bad value for 'fd' 11:32:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000240)=0x5) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r7, 0x407, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000380)={0x0, r7, 0x2, 0x58, 0x7ff, 0x929f}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000340)="6bbf48f333a2c7c8", 0x8}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1500.091452][ T9785] fuse: Bad value for 'fd' [ 1500.147261][ T9790] cgroup1: Unknown subsys name 'perf_event' [ 1500.153451][ T9790] cgroup1: Unknown subsys name 'net_cls' [ 1500.428286][ T9894] cgroup1: Unknown subsys name 'perf_event' [ 1500.434882][ T9894] cgroup1: Unknown subsys name 'net_cls' [ 1500.442401][ T9896] cgroup1: Unknown subsys name 'perf_event' [ 1500.450675][ T9896] cgroup1: Unknown subsys name 'net_cls' 11:32:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) [ 1500.935884][T10083] fuse: Bad value for 'fd' 11:32:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x9, 0xfffffff7, 0x2, 0x8}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "00000100000000b18f6e2e2aba510977301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775025ecce66fd792bbf0e5bf5ff1b0816f3f6db18000100000000000000000000000000000000000000d3dcdc14000000000000000000000000000000000000000400"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000380)={0x1, 0x10000, 0x7}) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r7, 0x400, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x4004010) write$P9_RSYMLINK(r5, &(0x7f0000000240)={0x14, 0x11, 0x2, {0x4, 0x0, 0x3}}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x1000, 0xffffffffffffff79}, 0x0) pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x4, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x3f}, 0x0) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r9, 0x4, 0x42000) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000340)=0xfffffffb, 0x4) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1502.644339][T10926] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000009" or missing value [ 1503.002622][T11059] fuse: Unknown parameter 'fd"0x0000000000000006' 11:32:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) [ 1503.305369][T10939] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000009" or missing value 11:32:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_newrule={0x30, 0x20, 0x5, 0x0, 0x0, {0x2, 0x28}, [@FRA_DST={0x14, 0x1, @empty}]}, 0x30}}, 0x0) recvmmsg(r3, &(0x7f0000000780)=[{{&(0x7f0000000340)=@tipc=@id, 0x80, &(0x7f0000000640)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/32, 0x20}, {&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000500)=""/51, 0x33}, {&(0x7f0000000540)=""/174, 0xae}, {&(0x7f0000000600)=""/48, 0x30}], 0x8, &(0x7f00000006c0)=""/182, 0xb6}, 0x200}], 0x1, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000240)=[{&(0x7f0000000500)}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1503.567788][T11079] fuse: Bad value for 'fd' 11:32:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000100)={{0x0, 0x0, @descriptor="07589ea51c37b190"}}) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x25, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1503.751805][T11080] fuse: Unknown parameter 'fd"0x0000000000000006' 11:32:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x2c, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) [ 1504.393600][T11095] fuse: Bad value for 'fd' 11:32:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000400)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000480)={0x20000000, {{0xa, 0x4e21, 0x0, @local, 0x1}}}, 0x88) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = syz_open_procfs(r6, &(0x7f0000000240)='net/nfsfs\x00') getsockopt$CAN_RAW_JOIN_FILTERS(r7, 0x65, 0x6, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) setsockopt$TIPC_CONN_TIMEOUT(r9, 0x10f, 0x82, &(0x7f00000003c0)=0x20, 0x4) 11:32:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1505.027653][T11106] cgroup1: Unknown subsys name 'perf_event' [ 1505.038173][T11106] cgroup1: Unknown subsys name 'net_cls' [ 1505.228461][T11154] fuse: Bad value for 'fd' [ 1505.287030][T11161] cgroup1: Unknown subsys name 'perf_event' [ 1505.293300][T11161] cgroup1: Unknown subsys name 'net_cls' [ 1505.329813][T11175] cgroup1: Unknown subsys name 'perf_event' [ 1505.336256][T11175] cgroup1: Unknown subsys name 'net_cls' 11:32:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000240)={0x3cfb, 0x8}) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@x25={0x9, @remote={[], 0x1}}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1, 0xfffffffe}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1507.499066][T12326] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1507.817773][T12376] fuse: Bad value for 'fd' [ 1508.249565][T12309] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:32:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:32:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@loopback, @dev={0xfe, 0x80, [], 0x1a}, @loopback, 0x7f, 0xf78, 0x3ff, 0x100, 0x100, 0x80000}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, r8, 0x405, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r9, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r11, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r12, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r12, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x60, r8, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x240000c1}, 0x4001) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r15, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r15, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000008880), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) faccessat(r4, &(0x7f0000000180)='./file0\x00', 0x0, 0x1500) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="02d201090e001e662ea422909aedee4d28c687e7a7000000000000000000000500060000000000ffaa8aed0000000000000000000000000000efff00000000000000000000010000c005000500000000000a00000000000000ff0200000000000000000000000000011f00000000007cd85e6c9c92b15372c76c92ae36689070150c40b3596c8fdc8177d35faefd7d04a3f93addc7b1f2fd6472a5b9ca555818e5e1e1881134e19d5d7aa0993e0c2efb00"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x22, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1508.518688][T12397] fuse: Bad value for 'fd' [ 1508.525683][T12398] fuse: Bad value for 'fd' 11:32:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x22, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x25, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x359, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:32:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1509.295540][T12412] fuse: Bad value for 'fd' 11:32:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, 0x8, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x68014}, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1509.918264][T12426] cgroup1: Unknown subsys name 'perf_event' [ 1509.924446][T12426] cgroup1: Unknown subsys name 'net_cls' 11:32:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1510.210539][T12494] cgroup1: Unknown subsys name 'perf_event' [ 1510.217110][T12494] cgroup1: Unknown subsys name 'net_cls' [ 1510.538287][T12636] cgroup1: Unknown subsys name 'perf_event' [ 1510.545673][T12636] cgroup1: Unknown subsys name 'net_cls' [ 1512.077441][T13532] EXT4-fs (sda1): Unrecognized mount option "fd=0x000000000000000a" or missing value [ 1512.346831][T13635] fuse: Unknown parameter 'rootmode%00000000000000000040000' [ 1512.802410][T13532] EXT4-fs (sda1): Unrecognized mount option "fd=0x000000000000000a" or missing value 11:32:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = accept4$inet6(r4, &(0x7f0000000c00), &(0x7f0000000c40)=0x1c, 0x40000) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000c80)={'veth1_to_bridge\x00', {0x2, 0x4e20, @rand_addr=0x1ff0000}}) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) 11:32:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:32:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x2c, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1513.097527][T13685] fuse: Unknown parameter 'rootmode%00000000000000000040000' 11:32:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f00000007c0)={0x4, 0x1, "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"}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f0000000240)={0x5}) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1b76ef4846d3c1e60d1f955eedb2e27b0fa5279e1b064823001c393209a5c84ca3853d77714ac60ee0b7b142e375e8acc3fbf490ac6ea2dbb472b84a71e1073e896dcf5eed27d820489dccf459863926c0faabb6e72d9e8bc02e58c41bc7e725cc9b6311fb2895ad5b0000005521ba62d7630896cfd242c6bb06fe2b49e171fec07a75c44a3acbba5f9076c57dfc16e42ec09e44d8c5e0d0fff5713d87ce83bfddc2aa99b07cde3d9e8a887afa64078af4a7687881315c48"]) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) writev(r5, &(0x7f0000000100)=[{&(0x7f00000003c0)="37a1d681374d4b123c18550259e5bd0249ab2cd8dc247b84988942a45266e467ac38df54b68dbb0f7c1dd2dab08e5c57b4764990e59fa5fa392ad17aeaf18229fa455a636d82cdbb5669df881b0c8f82b88e853089b899e7586ac64b152345e69dba0873970991681da81d0eede636ec4d90f8312174fb7667e0d923bc752ebbf1fa97b052f2cfa2079b2106469fedeede3036ddba137071233dcbc0ca3d82b1acf30e1881449c9154af", 0xaa}, {&(0x7f0000000480)="3850b850785acf9aa77cbfc5f01ed460eeb0f44f48746cd32cecbc3fe4a3df013e16290257c7b898c8fb5a9a77155c20e75b9bb6e38bb7332fb01f3b63927b8d45419fd79a78257909a2fb4224463040ec3a139cfd3bcf9f0f24f744d89fad46b9650cef184f74bf57b1a30f8d25c31bc14055a1ce7d24c8bfd8bd9f392f14e904", 0x81}, {&(0x7f0000000180)="8cff4534a1d6686074fcfacdbe69dfeaa6cfabd662b7f58e044a2705dc70385d094ca6ab8fd05f25614f6a0b93a655bdcf53b09b1c7c0b04af11caf57774f875338c16e8cbe7d92004a7262e36f1a2978f479f7c12a17cc351e6cfd9c2", 0x5d}, {&(0x7f0000000540)="487f361e9ad58442d52f70c885c8fae4a285edef211dfb3eadf14ede1d1104498f0c2498e315b19190a47f2f40bcacd428a1a847c7965a149e7cc03461dbe9935b23361accfc3bc3bbac026a72e631328551fe8ed17180e2f56e5e3f5f1f88a467f54ddf7271dcc23332ddf549574daab8c2", 0x72}], 0x4) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x300}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:32:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5c03, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:32:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:32:58 executing program 3: clone3(&(0x7f0000000500)={0x8200000, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0), {0x2d}, &(0x7f0000000880)=""/4096, 0x1000, &(0x7f0000000400)=""/175, &(0x7f00000004c0)=[0x0, 0xffffffffffffffff], 0x2}, 0x50) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000580)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0x1, 0x100, 0x8080, 0x8}, 0x10) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) getsockname$netlink(r6, &(0x7f0000000640), &(0x7f0000000680)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x260341, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r8, 0x407, 0x0) r9 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) r10 = accept$inet6(r9, &(0x7f0000000700)={0xa, 0x0, 0x0, @local}, &(0x7f0000000740)=0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r10, 0x8983, &(0x7f0000000300)={0x2, 'veth0_to_bridge\x00', {0x2}, 0xd}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r11, 0x407, 0x0) write(r11, &(0x7f0000000340), 0x41395527) write$selinux_attr(r11, &(0x7f00000005c0)='system_u:object_r:sshd_var_run_t:s0\x00', 0x24) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f0000000340)={0x12, 0x0, &(0x7f0000000240)}) sendmmsg(r1, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_AIE_OFF(r12, 0x7002) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r13, 0x4004743d, &(0x7f0000000280)=0x6) [ 1514.258825][T13705] cgroup1: Unknown subsys name 'perf_event' [ 1514.264972][T13705] cgroup1: Unknown subsys name 'net_cls' [ 1514.476132][T13782] cgroup1: Unknown subsys name 'perf_event' [ 1514.482763][T13782] cgroup1: Unknown subsys name 'net_cls' [ 1514.677360][T13861] cgroup1: Unknown subsys name 'perf_event' [ 1514.683601][T13861] cgroup1: Unknown subsys name 'net_cls' [ 1514.686929][T13867] cgroup1: Unknown subsys name 'perf_event' [ 1514.697935][T13867] cgroup1: Unknown subsys name 'net_cls' [ 1517.268417][T15340] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x1a8) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PIO_FONTX(r6, 0x4b6c, &(0x7f0000000740)={0x1d3, 0x0, &(0x7f0000000340)="9b778d3ba9d79b0d9cadb7091ce69cf9b93b9677692ef500c95b233dc24783e859a4d1d788c84fac5b6e5f6efc9fd37828f341a26a28cb753bcebe6ffab3d0f347ecf166436e373a211df98beb7c096ed787117f2265d1b03832ee8a0c34ea7478563c3ac1c6ba4c35f3ba268b0f1b20e73cdbccc704b34d439539ae2d6f95dc38fc4ac74156ec7c8a22d050903a85842411de31ebeca83177de0d0cdb838d41b290cddebd35bfcc5a5e33f92552713308651513d000596ae2536035ec310b1df734ab29371b5dc0bf948dc99fa4470db62ae1687afdcb00b11c9d00ac66b9492d034a7676a410a192a1d49e44d0c88c34ec0a27b4b1f7d4e9ba6535eb57dbe7342e42777873c161aa099ca06b8fb68d658c98e11b88ac4e8e17e7c8f0ef317a3e08adbeb9e4395e136d9caad7a80b829463b3fca566a8ddebbc66e3afb70ff2d48fda3d277610811f76865a908d7f9f5575b43ab992fb4b35915158ccca5c9c39a6f2c68571ec944ad186693881c14a9ef6aa254d8e546454167bcc54d5b84409c652c0e3e89b804f3689b5bf6ac511dc09c1b1c1a7a708e6682f7df9ccdbf732f9714b9c636a44d086ec8190d55cbec1a216325aef82428c6bcc4df712716ab6e54f19fd762a5b2ca8de196cb0e98ada5686869de3122bf8237b863b07a2dabaa242366277ae693320baac35dd80994840b70016693b4728995f4339cd3966c6b3fa1ded0175f9f1335739261b26c9523f68f0835335e371e98ba547f572214e70d9a56e0e4e88a68f066fbc4179080ee58320326f6a96ee18e62150fe45e653dd1a2c3eb1e548f3a89de0bb7b30e1a2745e64c96816fef1ab7014f5a4821b17e3b15d1154a098f8ed9a6d3f69c316d8d01e5bf57a72b6f06d0e49b1bc6a1aef6fcd33ed9c3aafd3b384776c284ee1384a69bce8ae5dd74f0ea68369905e0dfdce6f0420f9e1c926e0f41bf9023bb27f447994b06d13a377be10f8b57a49d514fddcd7f8143bb8364791575d133359a692b1161db0c46ef065560b88018d2286251ec8dd8a5f9d4ec8730cc1c08cc7eb99d32e230aa82648412c9630c21e3329151e7535d63695a55c928496aa0041cbdcc6ca1e466b584c5268446b32391efefd68a00ce014f478feb32a4a8f02294c30d853a33a0f00a54490b2d5768aa60b585cf9c54311fc37c3b72bf1198a7ad25e05cedd3685ce0358de88389763650fe5ebd7d88ac9c1078e4bdba4ab32e8a8afc4cce6bda22fafe0b68b5c71e4021f858fd8402ed985248d17e6f1bc3ffe7ea26c739a9679266b3997332f7b1a227112879033f9307d4dd5683711e92fb483b10829971b45175a7739c1e5569e7559710afe059d025d74fd28497a76c5e8cbbf2329664c7990ceb113e62c16583c1ff95295feb93113a5791b15764e126a2b47d6e06f849246067e466cd89cb8bf"}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r7, 0x8004550f, &(0x7f0000000780)=0xfffffffd) 11:33:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1517.320298][T15340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19767 sclass=netlink_route_socket pig=15340 comm=syz-executor.5 [ 1517.383252][T15355] fuse: Invalid rootmode [ 1517.470975][T15360] fuse: Bad value for 'fd' 11:33:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1517.976384][T15367] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000680)="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", 0xfffffffffffffd35) r5 = accept4(r4, 0x0, &(0x7f0000000100), 0x100800) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000180)) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r6, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300090e8000000000000000000000050006000003000000000000000000000000000000000000001a1a220e00000000000000000000000200010000c005080000000000000a00000000000000bf4500000008000000000000000000011f00000000000000000000000000000000009ab233216ab2de44734f4de9c3f295fe895c62ab2dae4dd70ad0cba6d77086ac87746f7426b5253fc9c8f4d1877b9b483c13e5955d15e88cf2f85d722e610784c4d5f45d839860b86b6772a304c0972f0d54e7a269e485aaa865fdfeb2db97609b28a9291f75b593e95a0c8735bed0afc1d04abfc324"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') 11:33:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x600}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="0203c5410e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000001000000000000080700010000c005000500000000000a000000000000004c426cae0000000000000000000000011f00000000000000000000000000000000000000ef7289e908a0e515aa60cffc0d12b8ab88cafbf87b2c61e2181a8f"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1518.130027][T15351] fuse: Invalid rootmode 11:33:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x700}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@rc={0x1f, @any, 0x40}, 0x80, 0x0}}, {{&(0x7f0000000180)=@in6={0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x234000, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340)='ethtool\x00') accept4$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14, 0x800) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r8, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002a00798bc387000000008009000000df", @ANYRES32=r9], 0x2}}, 0x0) r10 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r10, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002a00798bc387000000008009000000df", @ANYRES32=r11], 0x2}}, 0x0) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r12, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="24000096c68528f30cf6c0006578476a143b0c5055e64fb8f773c68014002a000681", @ANYRES32=r13], 0x2}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r15, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r15) splice(r14, 0x0, r15, 0x0, 0x100000000, 0x0) getsockopt$inet_pktinfo(r10, 0x0, 0x8, 0xfffffffffffffffe, &(0x7f00000006c0)=0xfea1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r5, &(0x7f0000000940)={&(0x7f0000000300), 0xc, &(0x7f0000000900)={&(0x7f0000000980)=ANY=[@ANYBLOB="50010000", @ANYRES16=r6, @ANYBLOB="000226bd7000fedbdf250200000048000180140002007866726d30000000000000000000000008000100", @ANYRES32=r7, @ANYBLOB="1400020076657468305f746f5f626174616476001400020076657468305f766972745f7769666900180001801400020069703665727370616e300000000000004400018008000100", @ANYRES32=r9, @ANYBLOB="140002006d61637674617030000000000000000008000300020000001400020076657468305f746f5f7465616d00000008000100", @ANYRES32=0x0, @ANYBLOB="7000018008000300000400000800010022d5040661630051d3667b2275c089494e569082bf8430827da33623e57e03e106dd9fb0f2ea7aa3d5c95e50dfba2623f9a283a87bf7611025f05c9701a357b32185fca95d2a8557cf501632e68128229075ea7d6a21fca90b4bf18eba67672a4f54f089ee15726ff906a5ade0b81b1b000000000000", @ANYRES32=r11, @ANYBLOB="08000300010000001400020076657468305f746f5f6873720000000008000300010000001400020076657468315f746f5f6873720000000008000100", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="1400020069703665727370616e3000000000000028000180080003000100000008000300c5a1463514000200"/60], 0x150}, 0x1, 0x0, 0x0, 0x4040000}, 0x40800) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r6, 0x400, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xa5}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x8000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r16, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r16, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1519.404165][T15393] cgroup1: Unknown subsys name 'perf_event' [ 1519.411724][T15393] cgroup1: Unknown subsys name 'net_cls' [ 1519.685953][T15501] cgroup1: Unknown subsys name 'perf_event' [ 1519.692749][T15502] cgroup1: Unknown subsys name 'perf_event' [ 1519.694294][T15501] cgroup1: Unknown subsys name 'net_cls' [ 1519.702094][T15502] cgroup1: Unknown subsys name 'net_cls' [ 1519.883653][T15586] cgroup1: Unknown subsys name 'perf_event' [ 1519.891599][T15586] cgroup1: Unknown subsys name 'net_cls' [ 1522.477302][T17043] fuse: Invalid rootmode 11:33:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) unshare(0x20060100) keyctl$clear(0x7, r4) keyctl$get_security(0x11, r4, &(0x7f0000000340)=""/75, 0x4b) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1522.568645][T17044] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1523.201383][T17043] fuse: Invalid rootmode [ 1523.244670][T17041] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f00000001c0)=[{&(0x7f0000000680)="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", 0x115}, {&(0x7f00000007c0)="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", 0x127}, {&(0x7f0000000580)="830caaacc07a8c78a76a64d5da5009316fb8471c06ac09a7352ed51aeb328aa84186af8b81a4e3b2e0634e3ca842df2c57fc7a95bc86e07e94119ef8bb4dc6f8dfc53bf005985dca6d1538cc99a859cc2e86676f89eb132c0b04b75591b5b519f825cfb649578c", 0x67}], 0x3, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r4, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') accept4(r5, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$SIOCGIFHWADDR(r7, 0x8927, &(0x7f0000000100)) signalfd4(r6, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r8, 0x407, 0x0) write$binfmt_misc(r8, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x1004) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008640)=[{{&(0x7f0000000480)=@ipx, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f0000000240)=""/41, 0x29}, {&(0x7f0000003640)=""/91, 0x5b}], 0x3, &(0x7f00000005c0)=""/62, 0x3e}, 0x8000}, {{&(0x7f0000000700)=@ethernet, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)=""/72, 0x48}, {&(0x7f0000000800)=""/71, 0x47}, {&(0x7f0000000880)=""/58, 0x3a}, {&(0x7f00000008c0)=""/199, 0xc7}, {&(0x7f00000009c0)=""/57, 0x39}], 0x5, &(0x7f0000000a80)=""/154, 0x9a}, 0x3}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000b40)=""/225, 0xe1}, {&(0x7f0000000c40)=""/8, 0x8}, {&(0x7f0000000c80)=""/98, 0x62}], 0x3, &(0x7f0000000d40)=""/72, 0x48}, 0x7}, {{&(0x7f0000000dc0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e40)=""/65, 0x41}, {&(0x7f0000000ec0)=""/151, 0x97}, {&(0x7f00000036c0)=""/100, 0x64}], 0x3, &(0x7f0000001040)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003480)=[{&(0x7f00000020c0)=""/193, 0xc1}, {&(0x7f00000021c0)=""/134, 0x86}, {&(0x7f0000002280)=""/85, 0x55}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/17, 0x11}, {&(0x7f0000003340)=""/33, 0x21}, {&(0x7f0000003380)=""/204, 0xcc}], 0x7, &(0x7f0000003500)=""/139, 0x8b}, 0x4}, {{&(0x7f00000035c0)=@nl=@unspec, 0x80, &(0x7f0000003740)=[{&(0x7f0000008940)=""/183, 0xb7}], 0x1, &(0x7f0000003780)=""/230, 0xe6}, 0xfffffe00}, {{0x0, 0x0, &(0x7f0000003c80)=[{&(0x7f0000003880)=""/200, 0xc8}, {&(0x7f0000003980)=""/107, 0x6b}, {&(0x7f0000003a00)=""/229, 0xe5}, {&(0x7f0000003b00)=""/143, 0x8f}, {&(0x7f0000003bc0)=""/114, 0x72}, {&(0x7f0000003c40)=""/32, 0x20}], 0x6, &(0x7f0000003d00)=""/249, 0xf9}, 0x6}, {{&(0x7f0000003e00)=@phonet, 0x80, &(0x7f0000005300)=[{&(0x7f0000003e80)=""/81, 0x51}, {&(0x7f0000003f00)=""/181, 0xb5}, {&(0x7f0000003fc0)=""/4096, 0x1000}, {&(0x7f0000008900)=""/53, 0x35}, {&(0x7f0000005000)=""/79, 0x4f}, {&(0x7f0000005080)=""/221, 0xdd}, {&(0x7f0000005180)=""/154, 0x9a}, {&(0x7f0000005240)=""/109, 0x6d}, {&(0x7f00000052c0)=""/54, 0x36}], 0x9, &(0x7f00000053c0)=""/4096, 0x1000}, 0x400}, {{&(0x7f00000063c0)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000006980)=[{&(0x7f0000006440)=""/31, 0x1f}, {&(0x7f0000006480)=""/67, 0x43}, {&(0x7f0000006500)=""/189, 0xbd}, {&(0x7f00000065c0)=""/203, 0xcb}, {&(0x7f00000066c0)=""/12, 0xc}, {&(0x7f0000006700)=""/71, 0x47}, {&(0x7f0000006780)=""/211, 0xd3}, {&(0x7f0000006880)=""/225, 0xe1}], 0x8, &(0x7f0000006a00)=""/139, 0x8b}, 0x3f}, {{&(0x7f0000006ac0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006b40)=""/241, 0xf1}, {&(0x7f0000006c40)=""/226, 0xe2}, {&(0x7f0000006d40)=""/20, 0x14}, {&(0x7f0000006d80)=""/176, 0xb0}, {&(0x7f0000006e40)=""/237, 0xed}], 0x5, &(0x7f0000006fc0)=""/250, 0xfa}, 0xff}, {{&(0x7f0000007340)=@can, 0x80, &(0x7f0000008540)=[{&(0x7f00000073c0)=""/4096, 0x1000}, {&(0x7f00000083c0)=""/162, 0xa2}, {&(0x7f0000008480)=""/179, 0xb3}], 0x3, &(0x7f0000008580)=""/155, 0x9b}, 0x200}], 0xb, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x289cd1645583765b) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x35e8acbc168a0ab3, 0x0) r7 = accept$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000680)=0x1c) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f00000006c0)={'wireguard0\x00'}) open_tree(r6, &(0x7f0000000180)='./file0\x00', 0x200) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0xffffffffffffff87, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1524.559251][T17080] cgroup1: Unknown subsys name 'perf_event' [ 1524.565447][T17080] cgroup1: Unknown subsys name 'net_cls' 11:33:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x4, 0x1, 0x202, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) setsockopt$inet6_buf(r5, 0x29, 0xe2, &(0x7f0000000340)="62e749c00af9e8a61154ba830da4d70da9533e1772f5d1df0bf71861a7506ef683b9aaee15b626a313ae79c17ee4cbea4b355dc23687e1f76b4b91f909741053350989b19d6b1a27d48e8d5bf512478d4ac511725bdfd5fc0305c9067c182b9c3333c4ea30e4a7b8240fe910bd9a6a525c95d9dcf645078d26f51fb1075224a57924ca04f6bc4a65f36cdf66a7cdae8465a928fb5fa50a7fec90b6da88e4b8a9047839ea3ef611619175fce86c582720adbdbb636868007ff3c42c67b77978e964f327f004e165c469a3a34ab5", 0xcd) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1524.884937][T17208] cgroup1: Unknown subsys name 'perf_event' [ 1524.891532][T17208] cgroup1: Unknown subsys name 'net_cls' [ 1524.962250][T17229] cgroup1: Unknown subsys name 'perf_event' [ 1524.974162][T17234] cgroup1: Unknown subsys name 'perf_event' [ 1524.980912][T17229] cgroup1: Unknown subsys name 'net_cls' [ 1524.985869][T17234] cgroup1: Unknown subsys name 'net_cls' 11:33:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="34000018", @ANYRES16=r6, @ANYBLOB="08002abd7000fcdbdf2503000000050037000000000008002b000300000008000300", @ANYRES32=r7, @ANYBLOB="08003c8002000000"], 0x34}, 0x1, 0x0, 0x0, 0x40800}, 0x48891) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, r6, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffffff58}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xde}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000280)=0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) r9 = accept4(r8, &(0x7f0000000200)=@nl=@proc, &(0x7f0000000340)=0x80, 0x800) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x29, 0x1, &(0x7f0000000480), 0x4) 11:33:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1527.256922][T18411] fuse: Invalid rootmode [ 1527.955780][T18747] fuse: Bad value for 'fd' [ 1528.004642][T18749] fuse: Invalid rootmode [ 1528.165074][T18757] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x7, 0x4, 0x4, 0x9, 0x100, 0x400, 0x100400}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/policy\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e21, 0x7fff, @remote, 0x2}, {0xa, 0x4e23, 0x9, @empty, 0x7}, 0x8, [0x3, 0x3f, 0xfff, 0x1, 0x3, 0x8, 0xffffff00, 0x80000000]}, 0x5c) bind$vsock_dgram(r2, &(0x7f00000004c0)={0x28, 0x0, 0x2710, @host}, 0x10) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) r7 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103}, 0x20) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1528.851903][T18755] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0)={0x0}, &(0x7f0000000f00)=0xc) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x42, 0x1bf, 0x5, 0x5, 0x0, 0x200000000000000}, 0x0) syz_extract_tcp_res$synack(&(0x7f00000006c0), 0x1, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000126bd7000fbdbdf9d0f11f6e4ce6155f0205e250700000008000600b9d80000080004000500001148000180060001000200000014000300e000000100000000000000000000000008000500040000000c0007006c0000002100000008000800a70b00000c0007001000000001000000"], 0x6c}, 0x1, 0x0, 0x0, 0xc}, 0xe0650888f258decd) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000700)=""/70, 0x46}], 0x1, &(0x7f00000007c0)=""/100, 0x64}, 0x1}, {{&(0x7f0000000840)=@caif=@util, 0x80, &(0x7f0000002640)=[{&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f00000009c0)=""/218, 0xda}, {&(0x7f0000000ac0)=""/37, 0x25}, {&(0x7f0000000b00)=""/134, 0x86}, {&(0x7f0000000bc0)=""/29, 0x1d}, {&(0x7f0000000c00)=""/127, 0x7f}, {&(0x7f0000000c80)=""/125, 0x7d}, {&(0x7f0000000d00)=""/87, 0x57}, {&(0x7f0000000d80)=""/207, 0xcf}, {&(0x7f0000000e80)=""/38, 0x26}], 0xa, &(0x7f0000000f80)=""/183, 0xb7}, 0x1ffc0000}, {{&(0x7f0000001040)=@nfc, 0x80, &(0x7f0000001100)=[{&(0x7f00000010c0)=""/13, 0xd}], 0x1}, 0x4}, {{&(0x7f0000001140)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000012c0)=[{&(0x7f00000011c0)=""/184, 0xb8}, {&(0x7f0000001280)=""/27, 0x1b}], 0x2, &(0x7f0000001300)}, 0xfff}, {{&(0x7f0000001340)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000001500)=[{&(0x7f00000013c0)=""/99, 0x63}, {&(0x7f0000002700)=""/162, 0xa2}], 0x2, &(0x7f0000001540)=""/32, 0x20}, 0x81}, {{&(0x7f0000001580)=@nl=@unspec, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001600)=""/42, 0x2a}, {&(0x7f0000001640)=""/240, 0xf0}, {&(0x7f0000001740)=""/229, 0xe5}, {&(0x7f0000001840)=""/198, 0xc6}, {&(0x7f0000001940)=""/241, 0xf1}, {&(0x7f0000001a40)=""/18, 0x12}, {&(0x7f0000001a80)=""/96, 0x60}, {&(0x7f0000001b00)=""/6, 0x6}], 0x8, &(0x7f0000001bc0)=""/24, 0x18}, 0x7}, {{&(0x7f0000001c00)=@tipc, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001c80)=""/33, 0x21}, {&(0x7f0000001cc0)=""/52, 0x34}, {&(0x7f0000001d00)=""/227, 0xe3}, {&(0x7f0000001e00)=""/63, 0x3f}, {&(0x7f0000001e40)=""/65, 0x41}], 0x5, &(0x7f0000001f40)=""/189, 0xbd}, 0x3ff}, {{&(0x7f0000002000)=@l2tp={0x2, 0x0, @empty}, 0x80, &(0x7f0000002300)=[{&(0x7f0000002080)=""/22, 0x16}, {&(0x7f00000020c0)=""/144, 0x90}, {&(0x7f0000002180)=""/126, 0x7e}, {&(0x7f0000002200)=""/206, 0xce}], 0x4, &(0x7f0000002340)=""/206, 0xce}, 0x4}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) vmsplice(r1, &(0x7f0000000680)=[{&(0x7f0000000500)="13385cff346ac7db0a93afb81e1129e6580bbb81fda92b3dbdb676f337ab388fdd0f19ec0d436405be4373b73431db2acb377e8ed77af207fbdcf7f61b5a6bbad4eba51354c4399ad2e7e197ef98de9efc9810e3dfdae3f5b237bb8de663a71ee3eb43c83f1bc95ce5087ce817f77a2dbbca61e84344ac9bd3f74b7d830751160b1c7891a83519c407ce4c0d6de2aedb2420168240a8c9a1eb6c2b26c08b9d7473437b2434279efc67dca094cd0c00bf318ef90e941359ef45d7ebee4996fb4a364b02d8028d2b47f56dea84efa3b806c4011dc967cf2565c6a7c0c18395d44df92f549f48f1080458", 0xe9}], 0x1, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r6, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x20, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xb00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x628e, 0x3, &(0x7f0000000500)=[{&(0x7f0000000680)="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", 0x1000, 0x7}, {&(0x7f00000001c0), 0x0, 0x4}, {&(0x7f0000000480)="575847311f0e7fb7b16652bd9eef1b4819d419e6544a7a247eeb825b9276846644d6cfd7d17ee678bdf1e2b1f610d6e2a6d637eadea9c9636125bfeff18e47912566b39a1f37b407a7e556", 0x4b}], 0x10000, &(0x7f0000001680)={[{@fat=@check_normal='check=normal'}, {@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffe49}}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@dots='dots'}], [{@subj_user={'subj_user', 0x3d, 'group_id'}}, {@uid_lt={'uid<', r6}}]}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xc, 0x0, 0x2, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x60}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000240)) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1530.071100][T18786] cgroup1: Unknown subsys name 'perf_event' [ 1530.077298][T18786] cgroup1: Unknown subsys name 'net_cls' [ 1530.277176][T18858] cgroup1: Unknown subsys name 'perf_event' [ 1530.286810][T18858] cgroup1: Unknown subsys name 'net_cls' [ 1530.298106][T18861] cgroup1: Unknown subsys name 'perf_event' [ 1530.298163][T18863] cgroup1: Unknown subsys name 'perf_event' [ 1530.306924][T18861] cgroup1: Unknown subsys name 'net_cls' [ 1530.312768][T18863] cgroup1: Unknown subsys name 'net_cls' 11:33:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x4, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ethernet={0x1, @random="3ba6301a2f28"}, 0x80, 0x0}}, {{&(0x7f0000000880)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1, 0x3, {0xa, 0x4e20, 0x9, @local, 0x23}}}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000940)={@empty, @empty, 0x0}, &(0x7f0000000980)=0xc) r10 = memfd_create(&(0x7f0000000a40)='\x00', 0x5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @remote}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000b80)=0xe8) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d80)=ANY=[@ANYBLOB="000100001a0004002abd7000fddbdf250a001401ff00fe07000b000008000400", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r2, @ANYBLOB="3ecce3909fead29c60827825ec1832f891686e552e7c51fe089b0bd7ade878f7bc60d95bbbe63a27b4ab2bcdde04917d82a6c56ff1fe65889f57e97890f209341a3242d1debc778ed6d3e70e5d94599df34c8b664dbb8450977d30825eb1dbdb87ebc96f1cd0225e49c5ca0d06337b61aa4493abff6db07b4fae38c5fa6fb969c6717f4c14e47f655302100d9747ba853955d13b75681c185edbeff4be8252703b678ea3a0ae44888f32e1e8f2d4e9ff0a3efc61fc24fc", @ANYRES32=r2, @ANYBLOB="0800100009000000b8001680b100138008001b00", @ANYRES32=r10, @ANYBLOB="14005b00fe8000000000000000000000000000aa9bce71592d4ea8cb70822efd38b965d011b1c60d27a1038e97e8bc4ae7927c2a7031aaca12b1b3255c85580f17887726b9f785477fde594d04f40b77c5e7a472f548623a963c7bc54e0c003c00000000001000000008001000", @ANYRES32=r11, @ANYBLOB="5fd26dd58457dd005c4c8fc8d3d79d9256095640a67337dcde329f7be244d10e592f41e839354badeefdbf1a7187ca8becbc819e0000000600150002000000"], 0x100}}, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r12, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r12, 0x407, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010ff7f8000"/20, @ANYRES32=0x0, @ANYBLOB="020000000000000008001b0000000000"], 0x28}}, 0x0) r15 = fcntl$dupfd(r8, 0x406, r14) statx(r15, &(0x7f00000005c0)='./file0\x00', 0x4000, 0x220, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getgid() sendmsg$netlink(r6, &(0x7f0000000740)={&(0x7f0000000240), 0xc, &(0x7f0000000580)=[{&(0x7f0000000340)={0x204, 0x29, 0x2, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x64, 0x0, 0x0, @pid=r7}, @nested={0x167, 0x10, 0x0, 0x1, [@typed={0x8, 0x48, 0x0, 0x0, @ipv4=@loopback}, @generic="2ab21e85b29d2fe95930b0ff4dbc98067b284334f65fb2690f7b0cc2e58328ea2e906c730019a7f81adfb4cf7f6c96c08138be6d4d8c4f5fa272c86b8557bb091adf96e82147d689f27f7ccd", @typed={0x12, 0x61, 0x0, 0x0, @str='vmnet1userH^.\x00'}, @generic="b506044568ce6768b07ea1adf6e94d1903fa3be5c099d804ce85585ed70fb7eaf35ce369acd866c35967dad2441067e9a3db90e9cd062604c0c4588bbcdd39d1d98b2eefaf47712ed567bd08dfa106110f1516a3a794dab6441cb5f07dbdcb02683fccb9767a91c43fb6baa278f789d62000ff4c86a7100ea8d835dec5decc1cccd648517b33b6a90b1fc0b41b157989158b2858335194af23f1aac67cf233995d448b6e30fb65740bf6fd7b7e3d4e739e7cce628786f1c5998829229193709f154aacb793878e6371fa0502925d25428d08640798baae3828c38f0410249110661ad90a2cf5c56a920ded9dcab2668257e8302ba3a4e0f367f2f0"]}, @nested={0x81, 0x48, 0x0, 0x1, [@generic="1b0bb9765cd940e36c62358b7b6dba88ee52efed2069da3296d62d3271c152c0ec6e81c362fb70ddf1010bee3b3b56788e73dcdcfb9c314d377304188edee686968850a12e6a8ae171fa3385f41e69181cb05487b3370055f3b60d434063b629bb3e6a5e7e721d0f6bf6ba3cf4", @typed={0x8, 0x90, 0x0, 0x0, @fd=r8}, @typed={0x8, 0x87, 0x0, 0x0, @fd=r12}]}]}, 0x204}], 0x1, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r13, r16, r17}}}], 0x20, 0x6004c000}, 0x8050880) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x4, &(0x7f0000000780)=0x7, 0x4) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1531.100468][T19298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pig=19298 comm=syz-executor.3 11:33:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1531.972520][T19298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pig=19298 comm=syz-executor.3 11:33:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000005c0)=0x8) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"/280, @ANYRES16=r8, @ANYBLOB="05040000000000000000070000000c009900000000000000000008000300", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r6, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, r8, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x40, 0x4}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) r10 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r10, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r10, 0x407, 0x0) fsetxattr$security_ima(r10, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000340)=@md5={0x1, "e219cd02c0b1a9f599450d778e679b9f"}, 0x11, 0x2) keyctl$set_reqkey_keyring(0xe, 0x2) r11 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) keyctl$assume_authority(0x10, 0x0) ioctl$PPPIOCATTACH(r9, 0x4004743d, &(0x7f0000000280)=0x6) [ 1532.906451][T20270] fuse: Bad value for 'fd' [ 1533.396900][T20464] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1533.517103][T20469] fuse: Invalid rootmode 11:33:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1534.111899][T20461] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x0, 0xfffffffe}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@can, 0x80) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000003c0)=0x5) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCSMRU(r6, 0x40047452, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$RTC_PIE_ON(r7, 0x7005) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000400)=[{0xa0, 0x325, 0x8, "cb5656f4a44fd9c6e55209f4cafe1dd8c96048465d0a0ad3241f84ea1a73dfc38dab3e553bd62bd9d719a02b12876aae09e56622f192964e150756f9904514daf33b898437950c8cafb2a36a365b286e9923069b15d8e96d9bb347bf8df076259673f367cde02ead7163ad9cd13cc7b6c8d1197e44979e5433e7f41d199bfb4edd760a048812b6fa74d67de9"}], 0xa0}}], 0x2, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000340)='trusted\x00', &(0x7f0000000380), 0x0) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = fspick(r3, &(0x7f0000000180)='./file0\x00', 0x0) splice(r5, &(0x7f0000000100)=0x2, r6, &(0x7f00000001c0)=0x8, 0x5, 0x4) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1534.223865][T20465] fuse: Invalid rootmode 11:33:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xd00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xe00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1534.428319][T20489] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1535.122771][T20485] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x800) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x400, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) socketpair(0x23, 0xa, 0xff, &(0x7f0000000240)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) finit_module(r5, &(0x7f0000000100)='procbdevprocvmnet0em0@\']securityself\x00', 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0xfffc, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3c00b87e4aaa24820af9c45daa0d46a6d18001ed7e7a99dcc474f944adabdc605e3927cb56a8360e0ff04dfe075aca0b4e86e494b8fc11b108836000f222b6c80e384ba02d685fb7c2142bcad197f5a95fc54d322b705a2fb20b3a85b55867b71ee244b5dfc5"]) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="020300090b000000000000000000000005000600000000000a0000003eb60a3cf7d60000000000000000000000000000ffff00000000000000000000000002000100000004d500080700010000c002000b00060000002000000000000000"], 0x58}}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000003c0)={0x5, {0x3, 0x84, 0x374f7ffb, 0x5, 0x9a, 0xffff}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x101001, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, &(0x7f0000000240)=0x8) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r5, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1535.537476][T20507] cgroup1: Unknown subsys name 'perf_event' [ 1535.543721][T20507] cgroup1: Unknown subsys name 'net_cls' [ 1535.793002][T20604] cgroup1: Unknown subsys name 'perf_event' [ 1535.799525][T20604] cgroup1: Unknown subsys name 'net_cls' [ 1535.810616][T20608] cgroup1: Unknown subsys name 'perf_event' [ 1535.817055][T20608] cgroup1: Unknown subsys name 'net_cls' [ 1536.499411][T20984] cgroup1: Unknown subsys name 'perf_event' [ 1536.506227][T20984] cgroup1: Unknown subsys name 'net_cls' [ 1538.445207][T22056] fuse: Invalid rootmode [ 1538.450045][T22059] fuse: Bad value for 'fd' [ 1538.875185][T22162] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r5, 0x111, 0x2, 0x0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xf00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1539.122945][T22050] fuse: Invalid rootmode 11:33:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1100}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1200}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1539.629826][T22161] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1c, r7, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r7, 0x400, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40090}, 0x4044004) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x142) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPSET_CMD_RENAME(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000005535880743a0056b8120b09fb8b7addf20000000000000000000001"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="b61eb6ad9d6435aa52c0b5a6fd040226bd7000fedbd02508000500050000003c00028000000000"], 0x58}, 0x1, 0x0, 0x0, 0x6e5008989ef5ad49}, 0x4000) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xc4, r6, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb29}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x32, 0x3a}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7d}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x26}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd0}]}]}, 0xc4}}, 0x800) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1540.423613][T22190] cgroup1: Unknown subsys name 'perf_event' [ 1540.430047][T22190] cgroup1: Unknown subsys name 'net_cls' [ 1540.610196][T22255] cgroup1: Unknown subsys name 'perf_event' [ 1540.616878][T22255] cgroup1: Unknown subsys name 'net_cls' [ 1540.625404][T22257] cgroup1: Unknown subsys name 'perf_event' [ 1540.631924][T22257] cgroup1: Unknown subsys name 'net_cls' 11:33:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1541.026270][T22462] cgroup1: Unknown subsys name 'perf_event' [ 1541.036065][T22462] cgroup1: Unknown subsys name 'net_cls' [ 1543.457147][T23786] fuse: Bad value for 'fd' 11:33:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000240)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1543.829493][T23853] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000008" or missing value 11:33:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1300}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') [ 1544.546791][T23859] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000008" or missing value 11:33:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) io_setup(0x9, &(0x7f0000000100)=0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) io_cancel(r5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x7, r6, &(0x7f0000000180)="dfb0b32495a06a21cdd5f723cdd13a5d29ce514f0b13ebe73f097f3df9ec1d1deb1a68e919fbc4c1144fdc24267ea8f339c13587c3eb67648e996ca1c2ea99bf6eb243bc904bbf45491f3e94c311ba972dba521773bb85", 0x57, 0xf14, 0x0, 0x3, r7}, &(0x7f00000003c0)) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = getpid() r3 = syz_open_procfs(0x0, &(0x7f0000000540)='fd\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x5, 0x7, 0x1, 0x1, 0x0, 0x9, 0x50088, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000480), 0xa}, 0x45e3, 0x2, 0x6, 0x9, 0x1, 0x8, 0x7}, r2, 0x6, r3, 0x3) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r6, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000100)={[0x6]}, &(0x7f0000000180), &(0x7f00000003c0)={r7, r8+10000000}, 0x8) 11:33:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'gretap0\x00'}}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1545.387489][T23870] cgroup1: Unknown subsys name 'perf_event' [ 1545.393669][T23870] cgroup1: Unknown subsys name 'net_cls' 11:33:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDDISABIO(r5, 0x4b37) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1545.657799][T23943] cgroup1: Unknown subsys name 'perf_event' [ 1545.672045][T23945] cgroup1: Unknown subsys name 'perf_event' [ 1545.674155][T23943] cgroup1: Unknown subsys name 'net_cls' [ 1545.682269][T23945] cgroup1: Unknown subsys name 'net_cls' 11:33:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1545.914332][T24027] cgroup1: Unknown subsys name 'perf_event' [ 1545.923780][T24027] cgroup1: Unknown subsys name 'net_cls' [ 1548.673545][T25522] fuse: Bad value for 'fd' 11:33:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1548.903536][T25540] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000007" or missing value 11:33:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f0000000240)={'team_slave_0\x00'}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1549.620863][T25556] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000007" or missing value 11:33:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x8000) fallocate(r1, 0x0, 0x5, 0x99d) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000068, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) read(r3, &(0x7f0000000480)=""/222, 0xde) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000100)={0x5, 0x4, 0x2, 0xfff, 0x7fff}, 0x14) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(0x0, 0x0) 11:33:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1600}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000100)=0x7, 0x4) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677269ec194c696407871a55e5ebca0f6274999f914c8c840f1b3870e8bdaf522f6dc5406dfdc8966284127f16d99aba4790509dc61e54d3c584676f507bd39a0b447ce549a9c76569f50fd872b10d6f11c988f20d326ebbb63a1038472035a2f4ce73275f301dea648ca352ea77b9aeb12093d15dbbd6c7ec1cfbbb0def0be8aab32fc2d92454a0beaf59998e89b477f7ef091cfb1882", @ANYRESDEC=r6, @ANYBLOB=',allow_other,max_read=0x000000000000093a,default_permissions,default_permissions,max_read=0x0000000000000005,\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000020001000000000000080700010000c005000500003bbcaae200000000000000ff0200000000000000000000000000011f00"/112], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000180)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1549.866503][T25566] fuse: Bad value for 'fd' 11:33:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x2, 0x30e, 0x32bb, 0x80}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = accept4$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14, 0x80800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, 'wireguard0\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fadvise64(r6, 0x4, 0x5, 0x4) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fsetxattr$security_ima(r3, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000340)=@v1={0x2, "630ea309d5a8ca766c29564134"}, 0xe, 0x1) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r7, 0x407, 0x0) fcntl$setpipe(r7, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1550.747524][T25587] cgroup1: Unknown subsys name 'perf_event' [ 1550.754360][T25587] cgroup1: Unknown subsys name 'net_cls' [ 1551.175142][T25730] cgroup1: Unknown subsys name 'perf_event' [ 1551.181380][T25730] cgroup1: Unknown subsys name 'net_cls' [ 1551.457862][T25865] cgroup1: Unknown subsys name 'perf_event' [ 1551.464474][T25865] cgroup1: Unknown subsys name 'net_cls' 11:33:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x3, 0x0, 0x1}, 0x1c) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r1 = socket(0x11, 0x800000003, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="90140d5b933ebcd43d951d3330834c1708708d09876e043fa757ae", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x1}, 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_SETINTERFACE(r8, 0x80085504, &(0x7f0000000580)={0x5f, 0xffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) [ 1553.573962][T26838] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1700}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1554.241325][T26836] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000001b40), 0x0, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r3, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000001fc0)={0x2, 0x400000000000003, 0x0, 0x9, 0x5f, 0x0, 0x0, 0x0, [@sadb_key={0xd, 0x9, 0x2c8, 0x0, "1ac805ed6ba6a1cb87be0892daecf73cc4f3aab83c64af08c4f14b33471d91226e6f10206133cc92ed997531d8cc6b6333221f5bd827df1dc78f87225e98a6ad4c96bcd08bed9c2967dd185ff96e9d01bff4417cb02f259433"}, @sadb_address={0x5, 0x6, 0x3c, 0x80, 0x0, @in6={0xa, 0x4e23, 0x7, @remote, 0x9}}, @sadb_lifetime={0x4, 0x0, 0x4, 0x83e4, 0x200, 0x800}, @sadb_lifetime={0x4, 0x4, 0x8, 0x8, 0x66f593b2, 0x7f42}, @sadb_x_sa2={0x2, 0x13, 0x20, 0x0, 0x0, 0x70bd2b, 0x34ff}, @sadb_x_nat_t_type={0x1}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x6e6bbf, 0x800, {0x6, 0x32, 0x3, 0x2, 0x0, 0xfff, 0x0, @in=@local, @in6=@local}}, @sadb_key={0x15, 0x0, 0x4d0, 0x0, "682e7c8e46c1966959d69f25b21796141f7fd02b8885885cdb46de071dc8fbb074ef8bae0ea968de691912becd6bcc522b239eaa74d86c37ca2035614855fa52aff36dbf2ce715578064580ae41bdd845750e84fd20ba9f62e2289beb136b9e512af46116d9dc4bb1baded81949412c47f8b7c923b518768408c6432de814340f6bb78efee7c3b8f293a68fe2c76b0132241b677f1c96a52f8ad"}, @sadb_key={0x1b, 0x8, 0x650, 0x0, "1ad3991e7084e358621a18dd038997b8647e67baa5a02cd7763eed91fd5fc6fc443f6b2ed49b88fc434a71a9573f6590eb7a1b7bc16289a18891bea4345145dcc0143a5b322a3d829993b1acad7b8872866698beb321246221ff3d4df8c77872c109c383ff1cf99028bb16f03b09f386e09dbaa7587e11c16f3bcfd1a51e39bec40e7b8a682bc6583e7864b112281e9aa1b7e44853f84d0d93cc5a3bdc420e04ec65e69a572282c7e43e8deedb312963a1e55f559633a69a8cbe8ffb60fdef922f59a5d19d5fcbc574c3"}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e22, 0xce, @mcast1, 0xfffffffd}, @in6={0xa, 0x4e20, 0x3, @rand_addr="7ee5471ab54afe56f678b6cb0a6acd14", 0x9}}]}, 0x2f8}}, 0x20) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f00000017c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001800)=ANY=[@ANYBLOB="2800000010005fba26bd7000000000000b00000056d404075ab32cd5c181533791dc6000"/47, @ANYRES32=0x0, @ANYBLOB="020000000000000008001b00000008004fe13c01037306ec62b17c0fc41e21c3ce6006927512464c3e23cbcc0fef9f1f9ab600d5009723bf5caa9c0999a927ce47160b2a69ff5eb5cba459b5d14966260ff532b5bd69ae37e32a4ed92c98ff75568f5e198584c182782f06df0ceb01fe330ce1e80455f2912643078cfe6c9c55cf00ff0d445d1958e1a5983d6ec2537fc9059086240fc17b747efd794322062be344a9941678d031e4f55fb46773787c5d1c8114f711e1dc7956ad0360fb729dfe8661b58532e94cc3795830170665c1bf6b706de690045238a69800"/234], 0x28}}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) clone3(&(0x7f0000001740)={0x3014000, &(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000240), {0x32}, &(0x7f0000000480)=""/79, 0x4f, &(0x7f0000000500)=""/236, &(0x7f00000003c0)=[r0, r5, r6], 0x3}, 0x50) sendmsg$netlink(r2, &(0x7f0000001980)={&(0x7f0000000100), 0xc, &(0x7f0000001940)=[{&(0x7f0000000680)={0x10a4, 0x1e, 0x20, 0x70bd27, 0x25dfdbff, "", [@typed={0x14, 0x3f, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x8, 0x90, 0x0, 0x0, @fd=r4}, @nested={0x1010, 0x8a, 0x0, 0x1, [@typed={0x9, 0x76, 0x0, 0x0, @str='fuse\x00'}, @generic="59bf7f070d9d9a983291464eff8f95a8b5d0268b1db28bdc913ac73e16a9177ab137aee51fb3e70aba0d5401429b0b3bf26b698de9554901b8e4104a995f16d81fdf715e2c5ab084148672d21af0d503d0f62baf7bdc77a01d1497350151917850d82316b247b2a57e9d2cf4e2eb017bab7bf4d369703f99dddd0b6f6ea17e237e909640a03a6526fd560e6b0de29e1fe983138ab049b1c979b9552da3eba35c5ba49ea45d134a189a56fe61209f03dbf630613c1d836c8a1cc1a806f6892230d1949cd460607510cfacdc2e797c36ad75726371ebb336b59b3786e7fb92f67ffea22d07c7fa4358951c1ff312852fce716cf25efadbe21065fad7a6f785c47b83cfb116880a4555db32c6155259febdc67a6246b727cea1bccf8e3a166e7ced6a32a7540090d4837a11ee368f49c224e835647b7cd285bf686d892078ae6ec85759b3d26d2735620acba5c6ae0640864c839e7d954daaf98f17a399f503f49d3b8c2a0dc7cda91b24ace3aa0ec035180442725639c8b6d61a8029947c1d76a1567c5d3f74b550d857058ea4553a7b2bb5fd804dc3ec1c45b02e5ccb48f3be594510894778f1136c86b90d8829a42d897db1304ba3b0164b4319160f37d765ee61328de020331abbbce2a21d48cd614e090af8411cb4451bc203b84f8e161a5f8dc7d817e661ba9758065ff4fffd59d7f7c7fa8e47b6c8e355953eb48f5e0ba136b68cf3c27c5cdbcafcf74ab16912c56b6788699ae4cd8894eee2f6880592d11e605ffb3f849381a525c0739b2557e429338a8e4b7a02cc097b5b4c24be0e76d756a1b0351ba1df692373f507c99be795705c43b976b9eae782c53caa66059a45cb8bac1a30e5dc8ad566a3298baba96e611748c052a93a55ebebf953253ae64fb227920921d271e36e826c2f8758680cbf094794bdb708bd675028036b139a0a275caca8737031cb230076bb1df68e4f70bf0423f09130811dee0ed9ba1d7d62a0c7e392565695e86f0df8fb3852116a5605f7515fcdf799c75211bfc7f0dfdea04b997c82db4371d06ec5322d3503e2a0528960982b3450ae3303e0a259b47c966b57a292cf633a53f65e53933a01d297f2aa762f07799c7202edd4d399e359073ce8ca10f59d35701c5b73beb3074482d24bae76392eb92c0cbb0591a55687563a52898fd297e9296f6dd1548d80e2c9b59b8c182b06da41c96a7acb441fb74687e54efecc951dad971895a924cb14a81243d3e9d2a2ab18107c11a67816db15b618d894d5234c44217a43164a221cb42ea3648fe13bde6d8ffa1b9e50b0c1c092776fca20c1d4632dfe2e44f15f1da9a4f2fa526c00496fbdf579b0bb321b7a7d87d1cd0bb5dd64c7fcce0fd321bfd5f601ab492c701512048a1671daa88dc8957aaca13824fc286ba74c3af2a6dd5eee0e8598c78c71cd9cb7b8f0867b136ce7ca7a7405b1ed5e365ca70d2cd665ade10f08b9dd127c50632d35b9829b33607712de90eac35b3f904bbb3621a3ee5249589d102bb8a0edc0ab728d1e40ce1c99b8ac690e923519200bb95f699c1d81e582085273272d27ddffccdcf5c3366fbc7817e8f4f603d18c7ad48c91b0863fb022ca1b876184ffa4201e277b432b74a351c7666a77c76b8baba1698aa24966a40292da60de9fa7904639528d2179bd6564be066e4b5e526297c4b685e5201e044bed29b407439a9fd86533df372ba955bf23df2ff6d6af12e6802559299433c33dd97b0861a1c95e1b2209f623d4e76700227eba10df987e34126edae7689710293863a9f58c4c506f1360d5fdcd3a0b9682f6ca93b0724458d5af7fd6ebd3700bbb0ca586cedc6d1017c58b8e772d9074655e4ec6828a495e6687cbecf13957c872ab87848aae515012ac1600443aebc5db79549c890fb3f2d8a89001e020a5fa51d79d5e40681c01ae1214e53389d98814d8b5ad7b2485309306dec85b291a33a71f61916906be604e6e70ebb8c3277a32bfb8bdd1a05b17ded12ebfc5febf52c7019524a3d327913d46bf11f884b92d9165724a070f14629ac6d270eb2f59f17dea0c488c28bcdd6309d53c2ca803524ababed2b5dbb2348289fef4df3dec28a8f582da0fe62b238df93b353f4a4b9bd1ae9f54a5c243a1326c2b12d7038acb8f03ba987d6f9399d2621e9ca7fa0e7ff358247d59ba4b7eb304c0f3a6722c05e9eef613026e67be0890e19b51685a42d9c6c282eb96d83b1febe74b646e2e3cbd91cf64d886155fd0403059b586b3046aaad084adf5559e8a0552f35f3248705ea305c56a26c66ce35f23a46dc8eb206e56888abd77c5c40edbe97a921598e142f2eb32fdde51bbea15a21128d33cf8c392e2bdd0f9527a976f115f3d011bc58b5e7859ab914ccea4fd11fddb5fb66cbbd693ca3dc4dfe0f1a6e3dd93de06c27f048da071e40fe13f908a08dfa8a771d971e0101918a3916af4b95c7cddcbcd6dd11b42d159fbd05cfecc2a68838fb48f136c49469b91cd8c179b859ce34cde76328c3ffb36097df4bf8ea5cf3c6749d2fe4e18ebe006575058483fbaab46fca8a8606817f893b1b2923cec9cfb314fe518e5ccc31455e8e362b975ce14a634bde128634c4ab1fb45150fbb32cb6e51bb77a2aefc57ba27ceaa2799f0c5b0eb6713a05cd1fd6469fe5f02202d6ac9ca662937b637ae7e9b1b62350f78ded4a62c13dd57662a87dc899a6a61a82289fe3f90b96dbd463cb843b501934b809caea44b166c6b22496426ad70569928c7f73edffb01685e83247734fff11e815908445934d43259c58ef3058b16666c661b9a35b108c4f715a2e71d58e532f9db4e903b034916d879f2ffdbdf711fa358fe8d268fede32d71daa18bbd922828d557b62437101d6d2dcf144c2994095510dd43e97c944f1099a343c62f79d4292ee534de46db41a8be6961269574e8bdfd91b7677a1544ca2d153ab0861b298924da4567f2f5b3ee38e2e21f98f8c01ab078e25d35ce2690ece4687128e6bebd97fe5575101f1d90f08c8aec46cf94fe45a3448c91f9171c7c186dbe53a9925a6fb2b95d3c3a249f6c872bfdfe8778d220ad6def96c9ed3f66a7c770e5cecfd65f468f0ef591f3d2a50cf9740eb71aff84065974cfc361c1c0d46a78a1cf88e299269a44a565272eca66849ad86dba09a2c85ecde4f24bf71dd469dd801e2cff4da80e8568aee615b300b7892f81b86ef29ee072f9d34368521061113b1d733b68e35c057f3a7f2ffb16d8b38899f1df95912d49ee74d4fd4e1e75f729bc720f1790e2d089ee785ef2d833cecf0f217b9a075714ef5ff3e539285e1a821152b38b6b63d2aa4c6f409b891407dbef9fb93db3eeb2b1399045bcc5f97ea434db0cf926aa6f9c31052f0de0a4f616f823260669fca48efb0024e841e4d22c017adbfbed4ca4f5a9f2aacd2eabaaaaefa5c4aa55ca9f2aff4f798850e9e572cc9c1e07de8f9552e3139f3babbdd62b17993d281abe31bdf2e8adf973b7200eff7ccaebeb19fad1a0c1c62abe346c99cf3951ad004fd1fadd14a6cae6c9b9aa514b8eb0cfdc3c244b1cd3d4a66ed33e2840b5fd8d39c7f225f523cef6b5b91d7a01541d96eaf7de65f68ccd78bdd267d5453b32a7c25706e7990254724ad7a5a61b4ae7d9ea621e21ce9a8b4224010e9028d92bb2c593d94de68e01d9f68cb30109fcca2a435a5e06386dd738043e8ca2b5aab11891f2c08d79e01b3d14d19904177410f3d725c2cea6bd14d0122312ad8aecea3c0f2703eb429ed351a7d46fea21520b3a48427fcfa3be8d49677a4714bf776cb255c7b939731fbf08df32c6d478c99fefbcbc94ddee875b6a7081de33e74c96e93cc56478730083a31ce5bdead5303b7d8fcf51db82d93a8360feefa2fdc16e2f78aaf3e8bd3ddf987d87152b29a904665d8c0b1f7c812df6e3c74122246c3c1dbe7305128b827a9c1754a10dff9ffc8d9c2e59e6f89a30c76bc4703879855a760bbabb4026b66137f15fa1efb7df61cceb68bd2e166469d80d23445fb0bd1346a7ce546918ec6ef51fa41f3a8f768139382e42bf63998eb863250d6b70fb9bab9c3c2ea26e8a7d39493f5b00dd1e8d0e1e112d3fbd75f7f3f09d6b8ae4ac063d3dc69a97cbf5dc8ac73cdf85bda27ccd0d98167c4a3477071f76e39066bb59624f37a273b5dde6eb64ea8b99c74ae3cf85ff13297a0ea9d310ba21658eb67d8da26df62422aa4d55e814b6b93fe0734159d9f669a881e1289932dde110db9a38211dcb51ff6a1b1f568cff6a7df8afbbd36d54e6928b6b8a422877bbf0d4fece05878c5a9805d117db5694dd412b4bcbb3105619b1c62d3872436c3b4b27bababf5a214194f20ee7e879c3ec0265707470dc5b7d07517595a48a2edb4165dfb19ee545d1d4e04a3392b77490ee608cf083cb19703ded93ddc85ecd60f08d03bb002b5437e33190447181a00ebf8d9285a27aa1242f3c033b0bb114a13b10c5506524f9c64212e741cb954486d5cc86f0a05be769315737008bd6cc085fe8544260e6e5fc0a4b0e6d93d278ec8d30e69dbcae3ddae08c16ea29f18c4043796375c1458d8d0a954cbea5a9bf39da9ea955b3653c9de2367a5f78fbc240a62a1d82695cc539077bd288fc091dff331c16e27aa0ed6f0f8db482999da1bfe2eaab04828da7c70652934abd09fdef8490c4bb8b9a647ae2f46f4199b9897c29d81487901789ca1a35694a1d302d416c87a4498a1035a31bcf766ee6d81bc1ae7194e81f64c518bae6eaf31dbab6578446cc3c3da904c15202d62dfad4da98fc2a7e4a6388dea4f2b789aa316a6bcc00ec1aa0ea59114cd214f9fb08e2b91a931a049d405ebbc8da9074f59aaca1cc809dddb0b823530f2aabebf56510f5f444e9122dbff4c50055a04c57a5ab115c7ee1218c70a3a6489699047293a03ee8e828db82d9ea50ac655dc5602985f16a5ed1878186ee844a0201893c5b1134a3e6e0dce71b4dfc0792bfc0429b58817fe222f72b1b7fd80f6d7f82f2fedf9984ba8d7e661a1d14a24cf679196c2537690ac5b9300496b721d6af26a305de6e8ba5021d662881bf87252f4958564f73c95c9c196e608780314bfb5e037dfb123e1c06bfc6675562350e37eeccfbe64299ba5d2c6856734b58a326712d1b9475a72c8314d2c4ca049dc72419b2838fb11cc447f6325bbaa2906b20f0fced9da5b7f4baa7d9fa0b9ba53ee0fce175cccfbc7f048e757a9bdbc21a50261880c888e2315f4f7b96fef428f074df7eaddaa0e355d1d995f9d96402ede87d15b5730c01e9829c22b7c4db8a7a27dd76f433affe767aae7efd7b0e7fe96999d1113e262d7a2422eda680b5c75de94354d29f98096f6cd17c4303b62e5fcabf4c186860e06837655812017ce35b7ced15c476cc27b5a02a3a1558f7f42f62e1a30af9657ae26d3b7b759123c1b7236dcc4dc51848294f57d0cb641ea1bea08ec254189019f37a1f83ca25c088ad1d835a0c9afa465a33e93a6655c472c2c3b9886a9da524846562aff6fd3a51ab37712e361883fa37f03ea06c2945e6923666b26b0c0bdbf4d9cf8649e484bdc6d56b0d2d1ade123e980431e930aeb774b54fe2b9908d7d2e13edadda3fb396a8054343d337200c28fd9c8c259bbf472ac7a2da5287739d0ed41c3d1ed77d57ba7792ae7f21400ced0323867cc911ad9e7323e558ad4d43187a18eeddb843e9105d5e347eb20aa7cb57d4db10f98fe07348dfa964c894dcf3829a907008040ccfab2265f82ac4dfc189c4d6fcb94a137c5fee80b6035fb5"]}, @generic="045d52f5c20b28fb63c44c6aeec16afadc25c2405fc8dd8168fe290636731ec86cb1607fe32a1ad598733ceba53b02a3352e072f0f823aa61eb5d4d89a04577bf710683cdc26ada106afea3d956645ad1f1100d1db760da5a429fc555666212bb06a16dc8fbc"]}, 0x10a4}, {&(0x7f0000001a40)=ANY=[@ANYBLOB="68010000270000032cbd7000f9ffffff55016c80d749de4c8f3dcf60572938876b4379266903a337e5040677f7c168e978aa737f4b25d934c795dd1d91176e508e9a5498b2276acc48a6ef928ab87b5e3a3676defd06953b071ad26bd90421805452c68c8305abeaaecc18d2b5d5c80ddfbdd99369d50bf2f44cc02bae625ed7760b3a59d5e2b36601d530fe0f217f34e5edc6ebc6d4494f29dde96e5794421fc1390f06943268758bd86afa827a77d5f7cb7b20cbfc92ff030000000000007f8690aaf445d4f807cdd456fe13af5c4f6f267349dfe620131ce91c25b90bf7686ed6346e9e283c25edce79542621cb40cc6e0ba53b7ee5820386b32e0238c5c14abe2881a8ecece86e20ae08000100ffffffff163ccedd3b8a9c10cabdd2f6e43275df9810b48b505c7c7e2ebee3b8a09a2a3717cdccc6c74e40cf0180dd7d0e293fa498e03554c9d23d4e24637d7a49161d056c2e36916abf4664699259154b263635f453a2", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00'], 0x168}], 0x2, 0x0, 0x0, 0x20040800}, 0x4004048) 11:33:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) read$FUSE(r2, &(0x7f0000008740), 0x1000) fcntl$setpipe(r2, 0x407, 0x0) sendmmsg(r0, &(0x7f0000008580)=[{{&(0x7f00000003c0)=@sco={0x1f, @none}, 0x0, &(0x7f0000000980)=[{&(0x7f0000000240)="65ca547573c1fc231fde55953c5482684ac2609eb54db1db3b2e45a691193a9d7d05dd8c052f64b51b4a24c09a75f6b334d6"}, {&(0x7f0000000440)="dcc5424e1cc9d9919ad5eb62cd279a064f6248a3b9dc15809f2932768a5a47a1273bd6e7221f1660b6c1b883bc6734eed6ca8f0880dce2f68323a0a89000903447fc297332b42a932714c6542b8f6f427d7343dab4f10a9f7fa4865b207173cb440bf3283676fcae595fc01d2cbf2183f458fa4860334c3e9ad0dd75f4decb8b89369988204439133cb9e8281fe445e71d30c0eea6969b3199382d6eb7068114b10fd0704cfb7ac4761359f3f5c1a52070d2ae61c8df5c4b666e86f7cd65b9190b0b625640db8899207aab06f4846fe5fedc956cbe8c68f41a9e71ce2d6422ddbc3154093eeffdfc73fde40dd355"}, {&(0x7f0000000540)="3f508dedd3bc730c139fd034061dc1b8c4c26344a3d1b761bd45573d9e2ed7016c389704816d27fed3048855a0058deb85095e8445c04c172cac40e9a40a017df89f411b78b67f457c7f5af5701b6e5974c583c3f4a162422182e09268863160a0cfdb3e8ca0f9696f8efbcfba1cec1bc5ea093254ca0650661c28ab904350dadae2248b1329c4d7d61d4cadd9e9b37114"}, {&(0x7f0000000600)="aeca4681c2d89d4b3c0797e22b0279fa1ad8669eafcc248a57ae5d962b8b25fe4d043149efd0f1f7cb645b588bd1dae6ed7f0e0232e7968912f5d6a3bce9b7d155e9e4b96aad2e4e7c44208c00775f90f9c70980aa862e637d5b840737e92fb11cdea7601591969e432c01981b7440d4bbf9c92c6894970a7728ae69c150933923bd33b2038140d9010cef2f649f8dfd6746c488c84b89c3d8c47593ac84ec5b8e83e0753139cfdcca14c6890ea5e8b41a8115ce80766fa1875a57b25934cd86c10acfbae2fa853782754bd30e8f10a7838f"}, {&(0x7f0000000700)="555995e25763f6a3efeca4171e3ace54d15b236ac16c4f6368a3e547d46a2f83dda783f2316a8cb0c20443a173df868f59d9b4e2c8c07d011d643eb5a54d6a216a689edc714f940b9e352d24ad007a6404f7b4f9992bd0da053f1609ec83d5cf4af1626b96a9664cb30850e29bd96dc34f1356aa96e92e9e054aeb1e9484b496e0a20c1a07ce57268998a3ca0d03c368d2a512a86579b4c82690c64d4d77e08e84499d1f57de10698cc13c4f806fdc855b8a59b097998018231873966e24a239fb4fa5931b17fb91bae0698500673f33ce3f0e33bec35229184379c3829e7fe6ff6633ffa7d0f7de18e3d7b216f513b28d4ac42530eb"}, {&(0x7f0000000880)="21a1433516e35ab32e8b54442e0f9672d4b3793af0d49d4d93f8c4ba58cf2e3bf36d113f1c0dd2dd26fc29f7acf258c2ede8a694ec96dbc3c64b8df4af632bf2dd7dfa21b85c06ea4f4acf5121344384e158df17e76fec02fcd1250dd2f063e7ddc1ce1d176f0860d3b2d1e6b5f0bbe43893e10f3ce9f2f8f681a5bb708448703e1b79a773b08a0ffded405e08fe1201d8f8b56515468c342cdf14b2eaf9599f83b27c30abb38f8d5cfcc005fca43fed24ddca7e9667b07f7c15027ab069e24372aebc5d83a1c41ce49d4e873b566acff46e5c7a288f50674acbeab3a81873f14bda308f8011"}], 0x0, &(0x7f0000009740)=ANY=[@ANYBLOB="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"]}}, {{&(0x7f0000001cc0)=@rc={0x1f, @none, 0x80}, 0x0, &(0x7f0000003200)=[{&(0x7f0000001d40)="6f36164d2988b9496846df3da0237fac857c40b0fbb73306028231921244ddb4242b85cd376e12018852fc4abd006518e8e248cd8b15c179bd95e7f6ff5b744128a1f24eebf0da5b3301a9237d44bd1ebf74e888025d956a5a2314b207a726569b05295d82995270bd34c9e8f7812a6ed8aa8466a3956283e73ea9d8c58e54d8893159ce72068fb4338306d46f501525ae93f76d86b9b3d307ff65874c22d96dc735e10de0a053fcf82d1f14da389af8da95bcd8b6c72123f01b77022b9244061f65a110da1076c81462212a170192dc54e9"}, {&(0x7f0000001e40)="a629e8b7cedcb01d41880628260ef1b1fe1eb5d7bc168e9a3474357232a92a782626a06baba71bed4407f52b11ac51d6358bd5a2019f5aa97afd0213222dfe51dd81aec8ab"}, {&(0x7f0000001ec0)="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"}, {&(0x7f0000002ec0)="d647e2401b69bd5601ca0029aee30eb14989eab61047bb4688e49e05f0d870e2587b12d38fcdb922d1a49a9c74e4e979dc4aebf384f0b64475732ee08e08098dea01e4d66f0371f2cd15d26080bd828f8be8c0f95c3d5e4145809d8bd19582e65e6887eef4"}, {&(0x7f0000002f40)="2c621a1b790f702d8c5a4a43f30a0592239978f6f8d5ef9fdc3bcff060155ffe35cfd7afba818c3f1c8fe7c4283ed8395049455b707c97162578c316f9f01eb3e423fa618314831d9e49b0c0eaa51b6f3920cfe4635dd667f9c16da631cc5b90f05d6bc87139de8a86e14d0b72e133582c9003decb156a4445c22d8a"}, {&(0x7f0000002fc0)="300d3d6dcae1b79ca84afd43283c14743f30f28a2b8716b70b5464d68052bceae50dbc7e0154a2973d78697b33813c38af37b0e8434759a4d0edde83ce162d3dad7f40302b27c81e9264ed30e1f89b9c65594b8e6969c7b11bbddd1dd8caa13bfd9317878877f0855878797e7a1163f923d81d71a8700a7f4740f80c3132fd2d203bf9686866393b44"}, {&(0x7f0000003080)="86e31e25f918eeb1418fb4cfa6d7d8510eb84d91a2d8efd1078e02da4147dff6e744c65789b522322732f268685396ce7f05d7d39238c047e0bca708fa85fe0662fe27a407a442a6a7d3a642d86300227a3b5bcd8cbfe49c07643e940d866aa93f3b0996a033056491495f52ea5ed39a89c1ec6f271bee7132c870b452e73fd4561f8c2736c0eeb05a5271e5adf687add460c0566e0de2dbeefce593f9ad8f275eef8ae6214c94bec1cef24cf58e08c5b5fbe4ae25cd52ffd6aa9b7096ea869ed0bb123b8163dd5d8f758be9215c0c3d13776a9acb87bf7e444446ce1f6b3464c8fb4eff0bbc2496f689d1555ca05ab99ae4cebafaedd846"}, {&(0x7f0000003180)="bcc9d02bae1c79ed44b605d9ff5940d71c94c0864388549d41f79db38b2526782dacf1c3ccd5fe6f92071506d05f10978fc5432cb665eab5b8259e8882b3e4b582f45013902bbd64191812d54b19753f8d66620decfb7016a4d169bf5e20b744d3ce33ae43158541eef12638da94dc54dd7049565b0a559a07cb700bb41f12"}], 0x0, &(0x7f0000003280)=[{0x0, 0x118, 0x9, "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"}, {0x0, 0x107, 0x2, "34264863decbfdec35346eaee4febf79331397073b8510e5f02e05a9c4f05e2dd1ce7e0373eb635b932652c7d110a5c9874443ed97c59568ffcfc64dcd0bb009521d1e3245f2de718edea6c2f4d8d5ed7f72769c20c988634c17e22c40fa1803d1a6a6526a1512d72a1e5d33bdbc39f561547ea2da4792d5ced77736a5c4930726e1da7fc4b91fd2385d50db5ce95d32014399746227d1658a6b21c99a06b620be16a24e5c73adec78e3e1e71ee2e75104d6d3cc9bb311846e02776f9e39d751f9f87b371d52"}]}}, {{&(0x7f0000004380)=@generic={0x15, "b2fbdf2243866c644a6c9d83a44c40f511e354ad4c1ff4396fb4c72d7a88cf574bdfaebc934af5af05486327c7a0fa58ffbd5158695de1f972dc98f2aace71e411d2811f07f3eb5214db217c8414dcf580eb825035433609578e2bb5ad11a19177e0ab400a27e59d7df336c144309e8ef9613302634eb8007a4ea30d155c"}, 0x0, &(0x7f0000004840)=[{&(0x7f0000004400)="77234ee2e501eeb1179f799e09ea138bbd9f31cfcb285f930bab8e1d5a0400665f73a3ba68c35a210469820a9f4c02c1fec1f6b70713bbfd4e5bbf6a3a02f9d01e1111d8b5af705001510e265b67504e8ba19b8f9fb92132919e12a08c62aea81664c8166ab30e27a822253006e1465c90fac016d892d0aed6c3952d3d112f6a04ea964704ee89f177f729cd1585bc63fb13e4f17c2c493324a6bff1d36b89d050d63e6dbfdbfcf934949637e9fc46e5dda16b9e59056ac9b4ed21d5deca5b3419466e3563c07336861dcdcd1155694d3476ea467dddc57b650d40f9c1a19c058730d398cdafbbab8b619bdb9b3d802e9d46ff4f1234610565f157ab20a5"}, {&(0x7f0000004500)="ac4245ae928a89184ffd23cfd68aa1dd42213b1819709c95165ff2d21d811bc642b017bffa2e0858fb09bbef298203d94bd7ff4d8f1621f2150e4b92e38ff058c4565fb6d6d908ca590bc9bc58202b1510ef826693553244da26fca6cdddec6e542affdcb79c4e728cb71671330900132b769f40891041e4655c1a925a60e936d88d96e4b00906549b569c541eecae2ebe0a687f623e654d61555cce581f31c522e4497ce84e13cd2a5de0b0ea0dd72cc3"}, {&(0x7f00000045c0)="a2bce417177be73bbfcf128190b3f00c5b7cda67eec572cfd64693516c01472d67f37432a25724800c348c91bae24e90e97a4820b24d360ba4f54a52a7240d088277e8251430f3277bec3cc2e73bae545b9789cc06ebb0aadef649490e8e3cb78b2a7c33e6c1e135a257aaa9d02e734ff33bec20a9f35472bda0d2500a79ba6e4d26e3b6699d9b32cfd4c20d0131747d41c5d86622b39d44f3179253a67c57da0479e61e27f5bb0bfa56974f64f2d48454446dd2bd7930e6b9599a8ca023f6273b4aa8fa00a9111a719a6874b7e6de639aaa15ab666ffb66951b5faa2d8f94a99fad576213"}, {&(0x7f00000046c0)="4eef0abf3f97c018f0b23fb65c88b0c41fa6aad261b284039e1adfb1e0cae9425f93233bf4d9eedef3c965073c4881c9821b600c42a68b82dd09539efd1b0284ff404a7de8b30535b7586a6c5c6f6caa3c6f2f9f75ac5f7bda1c9eeee0a421a1947545209014e4e8047bab7dbb4b19ef6e60c9de2d8595b4bf244c76eedcc97a06121090b844f1fc2bc1b09901b4d3379eef8c209317ab51146fa0f960a3b5"}, {&(0x7f0000004780)}, {&(0x7f00000047c0)="a2476929f9b144514538d8b2fd72090c5144a8de462bc9bdced44236d3c83e95eb2be964"}, {&(0x7f0000004800)="1c4bc592959c34da709f0beef4f0da8431b04b4d68d41fdd3cb7e3f05644a2a304bb983b9d7574b44bb6336d79bc9d2abab101dff685"}], 0x0, &(0x7f00000048c0)=[{0x0, 0x10f, 0x7, "e9bf7a051bafc2fd536e23f71add582e7ea20c15fffc608e3ba0ed8c6b68f73c1d4b60a74fb2941a78ef35adca6357dbdb2a6b523999d88b3b8be45deef59a702170ad6f0987513367731ca6ccc1b83ec5c96d355283bf2847c9edeac94bc0550cae6ca109a4bbfa86a5e993c2f8a387d9bf81e25a921d92f0309a8c3a3b61aba0c09a647c92ff7258efa0f353f12534e06b2a814603e1a795cc5c90534796ae5aeb5916cf2731aac9e0121ec675446db4c4efc05944bba59f40681331b56e79b239"}, {0x0, 0x104, 0x7, "78f7fe8067ea3f450408e4eefe29e1118477862209ee3a252957f725311739fa0c419fed670f5f8275e6bf3374335122c0de57f6f4f689d81a9f58674ae468c7a0a729e8bc4057c9690d83475298dbf5b5930d3fe7d73d98b622f288ca8548e78c157a11aeb8b4d45e3590f7b52304e014395ebe70f789157fc92e822be8e34671f38639be107b6dafa04769231ab3d30254727c5e6c7440960407c3c762a89fcb943503b49fd2a896e39399ee500af0cf0b7a6c0af51f8d24011d9f70fa83398956"}, {0x0, 0x1, 0x1, "29b15a0c4fc25dd070509bc9f7f2625c82b26b4b70f7693743cf317aa7e40b19af458c8fda118f34db148eceeddfd97065c48cdf"}, {0x0, 0x1, 0x2, "bececf77c479c32cca351f577660d81bb435026ecada71272d7c32cd"}, {0x0, 0x117, 0x1, "4c527a77a06582698fc62a6712bb5e1ae08eb29a2dc8bfc76e06ca42cbd9769fe3eb6cbb7e5874313a0819723c4373602765de5ba7bcf71ad56d06e3de0e28eceb48adb5ae232c691f1569fe7172c02f9bc63b3eb5f56bad160d0f9905d36194b44eb570f83815961c719e9bd84612cdb05b82f11e6a82733cf7934263b4"}, {0x0, 0x107, 0x9, "5a2bfe0b8823fdd55327e6559675475927fd8c592b5458722e23c65f565850159f9f"}, {0x0, 0x117, 0x7fff, "85ed4db61baa266f9d3497314d75e6b0713b1e62de92bf98d84f887e9868f35cf7e9600b72caa00050c71b62b91fa91a2ac7a2d48e17bd6f6b186ae960aaa049d8bc63bac349015fff1e2208d587688ce3e5657b76674162498ff491bf2e3c8f26dcad4b6ccaa87ace8fd04e0765d4ade6979440aa8155ac9bee96e16cd4a5bd9e79391ef6179c1d54f7d8ad88e849e2e12171cc9338fa1809352d8b3515c50ea5a24fde48de31c294810df2bc2f343ece854d6f745a7d6e9a013cde3772b04f027ea49fb9f034b33cc760be9a6ac85b0338962f7f5dc8ab9b7b2982d47e"}, {0x0, 0x88, 0x5, "04120eb2e5564d208bc7225680b8420e9ac965b45d856fd2c5ffb6e70886195b195a7b40855f900e1e1cf2557ae20cce0e69c8cd340115b958081eb1fbcce2c988a85a02eaa25d13ea1cea7dabe2c42439da1d59486400b53177f73a09b8c8187cbbdbc8b9d1fa3b13d0afc61745fc6caa6f158b3f195699068ac9709526adcef124a183c59a43cb5e13bb87"}]}}, {{&(0x7f0000004d40)=@sco={0x1f, @none}, 0x0, &(0x7f00000060c0)=[{&(0x7f0000004dc0)="2a1ebebbb3520e79f91a265e1a61168b2c1c1e7695ed53f98666f8c61e052abab55f202bed0f2de362c4965587a803d57b4777346979465b9990dd7510c08deaf8f4063c8c18b14033f30d7eeda899b5cb25813c86bd12f634a714632c3f1a4226c076d8a69d135e6cf19787c3d73782a2386d08bac1e99325efbc9fd849f09a4bb8cda2d431ef85"}, {&(0x7f0000004e80)="4f181b2555bd8568e1715482e1cd2c28c9b6fe31a3c912815b148598dd96fbe3162b992084165cdbb2331cbd84f0e09edccf40588118a56c121977d6d6361c9667fde3b99ebc51cbd1165a39b1fe203f4ac3dcec52af80296186ca703db599a042a0620026c9c8d425eca80354be851d7aa23aebb9f73bb4be1e2e515cd2defc7432566fe1a255e660904269cce9643291477b0cb7d504d982305937545886851acef4"}, {&(0x7f0000004f40)="984585a664776f45ac538ae747d63f65a123257fd543eed66820adc418256297de8b9a7d379907eccfe2a45f5a7d3f73699fba5a7dd5ae14889eec11b528632507e2e8a53ad50d"}, {&(0x7f0000004fc0)="c513f9ecfc9047dabce6039f1b56ba70c992957925d9193e1a12498b6cf326a5df2d508dd6a5"}, {&(0x7f0000005000)="812b45b79409f389885168faff"}, {&(0x7f0000005040)="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"}, {&(0x7f0000006040)="09ed63c8d7ad5b047f93ad2e1c8e5b2eead53d5996f2c99ed4d7dc57776f0e74436b2fa007c2261534f5d83750f22422a1358d0a6a2a7d777c3cc7e40e80bae625b31902dc0b99309a6bf2c215a1da1b0ff51add88ececb73bd90a2279c8"}]}}, {{&(0x7f0000006140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0x1, {0xa, 0x4e20, 0x4, @remote, 0x10001}}}, 0x0, &(0x7f00000062c0)=[{&(0x7f00000061c0)="8f231565ba079fe00430704591d05bc8903af9b98ef61b1f1c025e638dc05861372c97121a13b94e6b32e4547dc4593ea653aefea8545bd5294db053faab90ad9d68d429cae2eaf4c8138c8ffdd8f06fac7fa36e372e37ad9250b642f159f270337bf34df3092598ada00ad73d3e72718cdfc619e21ac0396b687fa1a151e130afc56fea1d29c441b3c301541199c0694b91b45f38aee865f6f33f506d475c11f2727172e129fe427c5af51b74d13347103f7a87d4004469a9893f857dbb1628a4f7781071c9036f75fe91"}], 0x0, &(0x7f0000006300)=ANY=[@ANYBLOB="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"]}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f0000006780)="7b06fdacb4549234afde2b14ff92fa57dc354c4b8ebd914635d72fc6247d6fc1f7e5e93e81ca98fc492c0df1544f1a"}, {&(0x7f00000067c0)="6d02149df288b08a3c06e14047d2bd854cbc7806dff049d3eeeec5967e62a33f74755177231a90d3debb8820a9737d2710749de9d888f64b19bf7c26c9fe4e2b6c6ad1bb6e99c7990afecc83cb86c9de2da90b775f780655ede838420c3d5f30afc512912212c482ff865c3b6bc0baa710380d4b47d2b076ca714244048fcfdf8097db776a6828fb541e452ab2167f0640de43e85400ac4131c91f081434473c5a80627de52df893233983e7368182b9635964384ad210112044104e7825f2f97728474466ea7bfdea9f285db9ca8f33a6948e7aa54532a5c4c3fd0c1fe7e602"}], 0x0, &(0x7f0000006900)=[{0x0, 0x103, 0x40}, {0x0, 0x11, 0x0, "0aa148c86a14b5d03c3559128bc8e1ea12e692d000b08ebdfee54e0ae3366b3b4a9a9db1f6f9ac0842693cc94ae40e153db153f56773e3c47061dbcc8ebb85cc03d3510ef8f1cb2135f44123537310b3fdab7671e4c0ac4207c007682d75cb85"}, {0x0, 0x10f, 0x9, "fc595768f92227d777bcc551f80713e144c1e9b24dae5dafa47808928d8f67c72d60c6927f4768773fbaed9f411ad00fa32e72406c255aacbce539a23f2847e2798a8db2256bae3238cbbd95b788c1f2f877c85e8dc3241a279cab880c68f3af4c8ddf7016b3d02bdc35ebc099684b8b81273fbad7e49af98a01ea2fcadb85422cd58de059339d8a2d15a08c9a95d0b907a28b0dcdda1a9135a2aac34f36186ed90eb3962520c989c40b59bac0d167d308ab4a095cfd608ba4bfcd744b41915ffb8df3b3cfdaacf62ccc2cfdf758bc97fc717829102214d0acaad2"}, {0x0, 0x10a, 0x6c, "81421205dddb0aa2008c3d6d7f8002074dc66e47c52eaf56a5b38f18b7b2d266a492b3955951cee714bbeca32b56e7e8be56d96004c56e598b055f52bc9109367d5818f630a3012d519fb65711ab3ec48e413d08180caceb8b7d3cf60c4b6af1de7842af18cfe933be41f191e29f0ea3f03e762aed447d9b53140a3b4b5d14206086e757529845763ff71e3e553b87f614306b05cb413143c3f6e9503b0ef529c4aca081f16fa81f6d972d82cf112253a69e615cdde61bf84d9e349a1e31075d02c8b6246426a89b50b9ab1ec5b66a301702e9fd5232e919ac3af32648f3fc25bd456f4e011adfcf0c0440c0997792d8b9"}, {0x0, 0x104, 0x6, "870157a93ccc1d1e9199dbede7eac371d550c5f5ec3a4aad27bbae173ffb1317064f6a93e8991dc61fd5822d94a5af96c683f3fc6c035689ac4161933824dd06d1b14094993bb4bd4d43c836cf3458931ad78895dc888c510ac251d8f56e75f32967c5a9ea3a0026feb45a136cf2f4abb2c191aeb5d2b64b47c188dcc52f1898598a05c7e61bad04c722f4585fe015fdbd89f9bac3c4d98e79e4e1000da39fbeb0bd9da3ff35ce1d0b46e61140e7f26929bc6169a2e5aae542c119b68a98f825dfa73ac0548b715bf61466a80ef0c4669328e25521859e733f31cc1a58e7de981c34798696"}, {0x0, 0x3a, 0x3, "79adfd2c8ef5afbf2f9e19dca022fce192201acd151d05ceb5a04ec4e2d5b369fef255db723b726ec8e2e1cff35bc0f87608fb708e7fb045a368e78d15eb48a65d21634cca1e8d59eb3b6a17138c8f33a349955ea0f399d08387a39a1e2a3496562fe2d4546445e6865b0d721b64c25659f905237a171f9b922ee5ccf3d982ace373aa69ccf6b1a947eb2c63b1b91f820d636593f85247864ca5988f6ff1801cbbc4b072ed863cf50d088c904ee3644067ba4f9230381bdccfbe1de60e52ac59f6d05cfc61324173d73517f2d19dbe24e87574"}, {0x0, 0x118, 0x7, "75cb8a8a077fb6deb093019c483b9201fb23fa00b2f13c02b6a76cf5c5d777435950061cee58bc6f9bc67852baebc8fe426b8324b5bcf25653a25040210dc1fb0dba296361323d20bcbb672b93"}, {0x0, 0x101, 0x80, "0328932d098a6b44146c173bbe65a1a6819a43f59bd1a7c1253bcda5155f728763fca7ed564ae62091d0f43dc128365a09ad84b299c047e59d1a1d57868b11218264771f36fa590527342baabffb0fb461ccc24dddfd0befec9ab232dd3d52661478c91d6d5af85669b648905662fffca8d1338d"}]}}, {{&(0x7f0000006e40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x0, &(0x7f00000071c0)=[{&(0x7f0000006ec0)}, {&(0x7f0000006f00)="4251d1c260823bf85b3f43e46eb8c56ce7910ff6dc7cc8a0835e9505e79c3367718c902b5fc49169d7a90723dc25fe666f1a86ef6f7d8d64e4140c479cf95e98c8bf3d93f1e11120b889abacffc68f35e6daa7d884e6f80fb7da8bfcbca56ae48498a0fc08e634d4ade11626943cfe8793013bc44c9406df090b9cf292ab2e175e40f92e78acf5db7c2cff797dbe137768c4f923e35323ad894cb545fbadf37043dab0194542959ee9cad2a3552247939ac0c9f66de30124f00e0ad6453b28bf4ed2767c96fa4e9b0d7233f9c683904a4659ef2a551afd9e3c271b4e7bc0f90535a9dbf2e853964abb157fa75cdfbf00b3333581e7878a0d00de"}, {&(0x7f0000007000)="98cd2b58d6282556fc2a25b6d04259a9510ec15550c3ec2722d895f16062bdfb8e53579bcc5d03cf5e29ab132ec861fb98467a539eef42e57e469ecc3c3cff7624ac4a0c07aaf6e0f09949289487facdd8ef6ca055"}, {&(0x7f0000007080)="562279db071bdbe41ba35ef403c1b52b3140efdf13d6ec2efd18411a9b8b7199c60a1c492208696eaf645885a5ac8839171f91e788c27aa225adca6099d3fb2a9ba7f58d6d680130252b093c403c3d7c34593f9be10824e0c226452a2fa2af5bb0c6ba54a6bd28f7f77287b4a882c504280c6586224c2b"}, {&(0x7f0000007100)="5452d53c33ac0ae352b831cf6d6dc9ac237750e45b6f6a8715dafa8cbcf4fc5a3dfbd07b82b40d8f63f0d075f12fc0db66ed097e1ba178587e4ac10625515f4651def1976f0af317487c3d5b537a2bb586e08c4a1df24f56043fb05c72715d5a16a578c968f2bcf9dcdef06b1ac710100f98c1f8e8994e358f2f239e3cfc1ef5dfd81333728aaf7788b62dd9932208d332bd7217b00eb24e7db81eeb8a94a9888aef04"}], 0x0, &(0x7f000000aac0)=ANY=[@ANYBLOB="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"]}}], 0x48, 0x80) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) 11:33:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d30302d381b21d681b107627fd3fa62c33030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="c8f6d4e375705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000780)=ANY=[@ANYBLOB="5b15adae020300090e0000000000000000000000050006000000dfff090000000000000000000000000000ffff00000000000000000000040002000100000000000027000000000a00000000000000ff02000000002867000000000000000000011f4c196604b3224fe7000e4b91b95285ac7cb0393297e7f4285c05a8a13580f65c287f791592b94000bffd0ca1dbb012b92d9fed1a2ccaa81e3ac5e6106bac68caba3e34c5a6d678d4847564bcb108f84cc1c4b2732247053cbc9afa0794c44c2d5206796f220b123bab37f3776c9bdbc55e81ef1996fa4c5eae4386bf2bb324b44f263c50949b7681"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000100)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RSTATFS(r6, &(0x7f0000000480)={0x43, 0x9, 0x1, {0x1, 0xe3c1, 0x2137, 0x80, 0x2, 0x4, 0x2, 0x5, 0x7fff}}, 0x43) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1554.771071][T26861] cgroup1: Unknown subsys name 'perf_event' [ 1554.777341][T26861] cgroup1: Unknown subsys name 'net_cls' 11:33:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1555.266654][T27012] cgroup1: Unknown subsys name 'perf_event' [ 1555.272970][T27012] cgroup1: Unknown subsys name 'net_cls' 11:33:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x29, 0x6, 0x40) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1555.712893][T27173] cgroup1: Unknown subsys name 'perf_event' [ 1555.721897][T27173] cgroup1: Unknown subsys name 'net_cls' 11:33:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1557.863989][T28131] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000440)={0x3, 'vlan0\x00', {0x9}, 0x4}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x5, 0x6) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000340)=0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x755d40, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r7, 0x29, 0x45, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4005}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1558.548190][T28130] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x9, 0x101000) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000180)={0xffffff00, 0x39, 0x4, 0x1f, 0x200, 0x1}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a00000000dcd8785e000000000000000000ffff00000000000000c600000000020001000000000000080700010000c005000500000000000a00000000000000ff0200000000000000000000000000011f00000000000000"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0xff, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x50}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1559.534407][T28176] cgroup1: Unknown subsys name 'perf_event' [ 1559.541368][T28176] cgroup1: Unknown subsys name 'net_cls' [ 1559.887289][T28247] cgroup1: Unknown subsys name 'perf_event' [ 1559.893668][T28247] cgroup1: Unknown subsys name 'net_cls' [ 1560.074788][T28331] cgroup1: Unknown subsys name 'perf_event' [ 1560.083437][T28331] cgroup1: Unknown subsys name 'net_cls' 11:33:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:45 executing program 2: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1562.422931][T29424] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 11:33:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4006}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x13) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfffffd89) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) socketpair(0x1a, 0x5, 0x4, &(0x7f0000000100)) write(r5, &(0x7f0000000340), 0x41395527) recvmmsg(r5, &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) fcntl$setpipe(r2, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800), 0x0, 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r6, &(0x7f0000000180)="1c13cb52ad774d1a", &(0x7f0000000340)=""/189}, 0x20) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$RTC_PIE_ON(r7, 0x7005) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:48 executing program 2: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1563.149858][T29423] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4007}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) clone(0x800000, &(0x7f0000000480)="329906b99db9e373e895a80cb914077ca677391c016e74098f6d7cb3d93f166ac3580b7d466f994c3353d94f02196eb5b4f8b443f8f75dd5391f58a20b870ac9c60c27df2826913a52a8573868da702c558dc293776338f6b614980a34feb71750c393adf7af233e1b2001c52597dd20dc1eab693f49b0c421b9141d415a010d0ec7f76a07a61015ed847ecf9b3bdf152782cedb03e25d74c0084e00630e104ad04b0cce93a292e85173c8ab565ecccf32e659", &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)="3dfadd1ad339c17f2b48c965f650573ae20065ea011c813e87ba74b784efdd7b488798446cba9dfad21828fa689cb75c30") syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x68, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c67720275705f69643d", @ANYRESDEC=0x0, @ANYBLOB="00005e5be97a56a8d18ac683df285be2af0ccde0b14c5b41912cc206a3f751b5c9c114042e7235f995115945ebabee70cf5a2b5a80321bd2f636"]) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:48 executing program 2: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1563.767308][T29441] cgroup1: Unknown subsys name 'perf_event' [ 1563.774100][T29441] cgroup1: Unknown subsys name 'net_cls' 11:33:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) r6 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x40, 0x3, 0x4, 0x9, 0x0, 0x7, 0x3c3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff7fff, 0x1, @perf_bp={&(0x7f0000000240), 0x6}, 0x800, 0x5, 0x10001, 0x2, 0x1, 0x6, 0xf3}, 0xffffffffffffffff, 0x9, r5, 0x0) fadvise64(r6, 0x8, 0x1, 0x3) [ 1564.313258][T29641] cgroup1: Unknown subsys name 'perf_event' [ 1564.322432][T29641] cgroup1: Unknown subsys name 'net_cls' [ 1564.493695][T29730] cgroup1: Unknown subsys name 'perf_event' [ 1564.500178][T29730] cgroup1: Unknown subsys name 'net_cls' 11:33:49 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1564.672446][T29810] cgroup1: Unknown subsys name 'perf_event' [ 1564.679859][T29810] cgroup1: Unknown subsys name 'net_cls' 11:33:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000240)=0x6) 11:33:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:51 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000240)={0x0, 0x2, 0x0, 0x5}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1567.520876][T31124] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:33:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4008}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:53 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCGUNIT(r6, 0x80047456, &(0x7f0000000240)) 11:33:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) 11:33:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)=""/250, 0xfa}, {&(0x7f0000000780)=""/251, 0xfb}, {&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000540)=""/141, 0x8d}], 0x4}}, {{&(0x7f0000000880)=@tipc=@name, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000900)=""/178, 0xb2}, {&(0x7f00000009c0)=""/98, 0x62}, {&(0x7f0000000a40)=""/147, 0x93}, {&(0x7f0000000b00)=""/157, 0x9d}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000bc0)=""/34, 0x22}], 0x7, &(0x7f0000000c80)=""/27, 0x1b}, 0x8}, {{&(0x7f0000000cc0)=@sco, 0x80, &(0x7f0000001280)=[{&(0x7f0000000d40)}, {&(0x7f0000000d80)=""/192, 0xc0}, {&(0x7f0000000e40)=""/241, 0xf1}, {&(0x7f0000000f40)=""/119, 0x77}, {&(0x7f0000000fc0)=""/188, 0xbc}, {&(0x7f0000001080)=""/35, 0x23}, {&(0x7f00000010c0)}, {&(0x7f0000001100)=""/202, 0xca}, {&(0x7f0000001200)=""/121, 0x79}], 0x9, &(0x7f0000001340)=""/104, 0x68}, 0x1f}, {{&(0x7f00000013c0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001440)=""/16, 0x10}, {&(0x7f0000001480)=""/20, 0x14}, {&(0x7f00000014c0)=""/233, 0xe9}, {&(0x7f00000015c0)=""/108, 0x6c}], 0x4, &(0x7f0000001680)=""/30, 0x1e}, 0xfffffffb}], 0x4, 0x2041, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001f40)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) r11 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNGETDEVNETNS(r11, 0x54e3, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) fstat(r12, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000d40)='msdos\x00', &(0x7f00000010c0)='./file0\x00', 0x100, 0x8, &(0x7f0000001d80)=[{&(0x7f00000017c0)="3e0a1388ecd797557728c3eaca2460570b2586357740a9eaedd3fd733130dccdd2ce2a85b9db899c7a85826357bdbc62a3fe0dd612bdbe2bdb9610b004c45cc0acac708e694c92771ac4be4d3451665ec0921ec710d598304975e4e5a8d9bb17112f45fcf6d1c71793fc642a83f5bfbb4575469b", 0x74, 0x20}, {&(0x7f0000001840)="fcd558eac69e3347b20ee5f2128b140358fad48faf6d2daa121ec401d615b2276fae66f79fdbe48d140657cf89922ef807fc72986e047b6982ee5a757388fd804eeb30b62e1bb5a376252081d2ad6f5f8b1f79d8f3ae9e472b9b888fbdf2c892285ce91f50297f5665b4020842aebd58f3bfab3d6f18009a4607e6dd59a14a0af4d1124682e2fcb2c061e995c50d889c59056f4917aa62a27b18a804a1371f59e999f85ded2abaa3f2d25e8cd37a05855fade6763d471a5cb89bbef5cf41f75b4f7c85ecef0a1b48706a38e0bb2c81ee1228b6d9b4d3f5d9", 0xd8, 0xffffffffffffff00}, {&(0x7f0000001940)="f789847943a5ba119bf57c8dde14b50dffd1a67b528cc6731eac55421dd89273f2e4e54642a9cfb8bdc3e96b89403c74197ce9f3231f1cfac648e1fd8dc2d6c1e38329acaa46567b67cd0c47bc41bc7c13bf82e9eb51b62236d7b9fae43e740940312bd9fea73b7e8c51bee9d68a86df5b1f253e25ae83b42ab436843b2f", 0x7e, 0x9}, {&(0x7f00000019c0)="9f196249539cd0bfeb39eca80583bbb34542994ebadcf0399f452b771efe8b78f19e847eb11b1554112e7c9ddeae3facf2e63aa5651a2e3046ddeba6707f6a2d32d805c01a15208c336b80", 0x4b, 0x1ff}, {&(0x7f0000001a40)="4ab7650b92165e078ca24a0f749df710c42508309c101e4729e7e9c7510928f5e1b1646f5c898667c0ec3cbfcd71eaebe0ae32dd0255b4891d0fbaf1834fa4ff6ef3efbe0ef183dfcefb2c342e1563eda42eb999db94f416f0f2bc580068fb9453d49a6f4d9dfd21c5ed775d6fb194148a062e31de28358275a2f1bc80df87c5dcb1f2ef95fdd48e43057edfbc19cdb6333ce37ddafe304eb577c6cefe0b2d5710d270c1d35fdec922bd5885d8bd68a63c404b87942996", 0xb7, 0x3}, {&(0x7f0000001b00)="dd6320694ff82f9a9fe347e06848c74b9a68d74d0ae8409cb8c4e52279f4fbdff8faf2391896a3fc5f32ccf964e3231807bb77128a8ebc6656c4991e1eb258ce60957d0ddeb2b58f559fd3953fb05b538d19f9f974bdfe51c19c76a4a2e5557b83d46a657013256e2365ca0be39b88b3f3bdbbee3a01c862f8d07f6a4edf3be519ef8d18ce8cc69c4e117647ca5de355ad31d2e8f9751ebbd7f91d151589ecc9d458bde52514e9571ae105fb0e05c96ba0db4f805588827653d6d598e2", 0xbd, 0x1}, {&(0x7f0000001bc0)="e4248e5c20bf06efe59676917a7c41699006a5a3fda535be570aa63037790c765abb104df01534fcba709db6c8f1417b5bb1fe48785ab215e177a2d283b0883acd0d5e550c190a842397fbd924ab70672590b4abae5f6530ccbafeea827122d232485d49dce9efbe212030796c4ab9db10a31c82587e570a1f1266d742bbf2fb4eb9500c8e62e7936abdcbbb17b3314dccc9eba1385a238e4884f3f4a2", 0x9d, 0x100000000}, {&(0x7f0000001c80)="9a011d9483dafa35ef7fb98141a10b011309b8d682c25858d8e91f80deb4086950e99881b740a53404ada401f8461fbad0d03c69e8f40df8e838f48b8b7dc2649c68258a26e3da987ec616c225079f43c8eec3600ef261818db4efb21109dd14c31258afc3dccf4a2e8f7ae77a42e63dcec1e068e61b91e97031289ef82883cba061f385200a1ddba8c51035500463e008f155bbd8984a1cc5dbeba94efb693e482a72512936e60db6b66bac3693d782bbfb40a476829e005d6257ba8e883af164e31089d3cca1b6ae05500c468d989261b68c202c5ed17c1d299de303fa4b", 0xdf, 0x6}], 0x1000, &(0x7f0000001ec0)={[{@fat=@debug='debug'}, {@nodots='nodots'}], [{@hash='hash'}, {@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '&wlan1'}}, {@euid_lt={'euid<', r13}}]}) r14 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r14}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r14, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000001f80)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a00a554ce0e000000000000000000000000ffff0000000000000000000000000200010000006fc336710a1e50ed267387000085102f94010000c005000500000000000a00000000000000ff0200000000000000000000000000011f6b123b45000000fc0edab958d10fe7088d64024324fe2d85ebd547b762eeeb01add3412ca24973012a61a75adcc936a8fe9a9468373ade2350d33493b38a5f3d3383ed1bbf4f0cfc5b31e7f3d4943d04e9db65a57c879433a0633543ffe815032a7c484670f4055be2167c83f7efed6932f06e5ce6cf43e2bba82a5338d201e750c54da07a2f7b75c26e92ae8d7bceca28a7fd65efa24195cc19da1f14e7bb291fce9597f769b3c0"], 0x8b}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x6, 0xfc) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4009}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) fsconfig$FSCONFIG_SET_BINARY(r5, 0x2, &(0x7f0000000100)='rootmode', &(0x7f0000000480)="a09c06703b9b878a4c5356914650517452baf06e9c16f27ab82a9904894b63febe4ef7f54d711174c8e2c921f9d8f1efc577fc6c51b2848f2f1ec29100f91f9e17b8a7afdaf643d3d23394ba84d57f815ee05a0fedd89fb13c7e1ce986748fa54b95c7a86dfa761c6c80da2e9980de1d948d5c4453e70b990624f4d5008f8c617116909e17fc77cf0c46119f946d9a943715429654cd7c8f40ce33af84af0a97", 0xa0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000540)={0x2, 0x400000000000003, 0x0, 0x9, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e23, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x77}, @in6={0xa, 0x4e20, 0x81, @empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0xa0}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:54 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000240)={0x0, 'wireguard1\x00', {0x4}, 0x8001}) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1569.473369][T31154] cgroup1: Unknown subsys name 'perf_event' [ 1569.479617][T31154] cgroup1: Unknown subsys name 'net_cls' [ 1569.716473][T31239] cgroup1: Unknown subsys name 'perf_event' [ 1569.726837][T31239] cgroup1: Unknown subsys name 'net_cls' [ 1569.733274][T31242] cgroup1: Unknown subsys name 'perf_event' [ 1569.733601][T31243] cgroup1: Unknown subsys name 'perf_event' [ 1569.741121][T31242] cgroup1: Unknown subsys name 'net_cls' [ 1569.748879][T31243] cgroup1: Unknown subsys name 'net_cls' 11:33:54 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) fstat(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='bpf\x00', 0x40000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x1}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r6}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$tipc(r8, &(0x7f00000003c0)={&(0x7f0000000240)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x4}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000340)="a2bcb222108737a4c7ca2cfe37c645ff060bd89cbfb8cd7bd13c27c5d50cb404460776b2b97cf4363443e467e7bfefef242a1f08", 0x34}], 0x1, &(0x7f0000000880)="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", 0x1000, 0x24041050}, 0x20000041) [ 1572.698148][ T354] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:33:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:57 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000240)=0x9, 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x800) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d303030302a3030303030303017303030303034303030306c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x400a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x6249c2, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff0000000000000000010000c005000500000000000a00000000000000ff0200000000000000000000b297fbc8643872000000011f93a8c137f305a55bbd2f1ddcdbe6aa983cc49dd44002d0e771deabf785c4ae130158110d74a40273e2bcd54b68293b88e2711e04f52c50e496067cc9f819e8aab00b60c879894fe7238735834c83859ab9376d98720ae07a37b47979db10d9f89669d497013dcef8d276738381c194521e01e37c4a2a23075fdcacdd8754"], 0x70}}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x204000, 0x0) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x2) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x400b}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:33:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:33:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000400)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x4, 0xfffffffd, 0x3, 0x1000000}, 0x1c) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x8, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0xc8) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet(0x2, 0x80000, 0x0) bind(r4, &(0x7f0000000340)=@caif=@dgm={0x25, 0x9, 0x7f}, 0x80) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffc, &(0x7f0000000240)='rxrpc_s\x00', &(0x7f00000003c0)='{nodev\x00') sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:33:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:33:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1574.693514][ T398] cgroup1: Unknown subsys name 'perf_event' [ 1574.699843][ T398] cgroup1: Unknown subsys name 'net_cls' 11:33:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0x0) r6 = request_key(&(0x7f0000000440)='rxrpc\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='vboxnet1\aposix_acl_access', 0xfffffffffffffff9) keyctl$instantiate(0xc, r5, &(0x7f00000003c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', '/selinux/policy\x00', 0x20, 0x23, 0x20, [0x62, 0x31, 0x0, 0x6f, 0x37, 0x35, 0x66, 0x64]}, 0x42, r6) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1574.968892][ T488] cgroup1: Unknown subsys name 'perf_event' [ 1574.975332][ T488] cgroup1: Unknown subsys name 'net_cls' [ 1574.981487][ T491] cgroup1: Unknown subsys name 'perf_event' [ 1574.992549][ T491] cgroup1: Unknown subsys name 'net_cls' [ 1577.382689][ T1652] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r4, 0x800, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x401}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7ff800, 0x6]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r6, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) [ 1578.085293][ T1670] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x11) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) get_thread_area(&(0x7f0000000180)={0x4, 0x100000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) 11:34:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x400c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x240f4081) r6 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67528100705f69643d", @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=r6, @ANYRESHEX, @ANYBLOB="a01c604eaa394d2c92111f39791af27aaa58598d968e7be4811bd35a9084f33b95f2a7a09a15773365c0a54c4dd512091ed2f7e403e75dd0c014456321e9159096e3aec9583511ca6d2c70dfdddad9e62ef9f8ed3539f52eca81f55737a3307ce27a328d580710fd48bae40d6fde09fc8a2ca668281cdbd8fe7a2a587b141491452d163811260ac43029fb3167126287112dae425a58b187859abbc8faf65e0b5386f4d80ade5267e06c9a5f04f8e2d49dec496288e098244063682834f7da6871eb71212e0acec4c00e31573877c5"], @ANYBLOB="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"]) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e00000000000000000000f605000600000000000a00000000000000000000009b1241150000ffff000000000000025e1a7e60e2590001000000000000080700010000c00500054f520000000a00000000000000ff0200000000000000000000000000011f00"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x400d}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/member\x00', 0x2, 0x0) fsetxattr$security_evm(r5, &(0x7f0000000180)='security.evm\x00', &(0x7f0000000680)=@v2={0x3, 0x1, 0x4, 0x80, 0x1000, "9ab2ff6345b1ed6cce76d203e207dcedefcbcb0262078207555ae773d57e743850217802d47c2ee69d96265fd35b47150c1c931835c8e65c06ecbb92ec8e286cee5d13026cb0ea3ddaf0fbd1736b9fe7200aa35731e86be9f0f8537c4667565ec281b7a77b58ca9e4412b78a811cda2ed1f843553a43427a70ba90ed8837b1f621d45edbd83c19524ac17f2df00b48bd4865d96ee51e28306a67b93c77b2b6d8f0b8ea49ac51fa848efd68396f060c175de04c3bf36df54e7fa688a58748b8b2c210be9a6235ec7f6ceb34c16bfa437fa6467c27dff0be560dd3e25d5dd18f0944f3cfad52561295cdc0893c44871148390de1062d37fcddfac5baad4988a8cb9709acc8bcedc6f0493f92486b64ace155567bfa5aa4bc40f3c34edde2346fbc5a892bcffa45db20f39fbd70546ea3b59bb94aacfaafe5a0d10eb75569a11f08233e74cb8ffbd1ccaf88dc951e84b562c4ebc93a006a74dd3cfb60f03c90a85a0e3f91dc9357cc695a439d7da62a089ad5302be4008dc951b9957fbd94af0b3121925825c14ef203b3acf61a2f7db42d9db2373e94c3ebc49e169abedd078582d98e5a0a7ae14294095d57b4aba73a077ce03a890c6bc3feddb43436fc64c89960db75b6aecdc04f8fc2f5722aeb586ed724ce083a0b275571044dc525a627d5ff84a7a7157a687e6eaf361de0cf00a3a741ca0e9fb9121818034832789cd0ad305317396ae5d4f49c4716f19b8f1e48ab549108cf0d61b937d571975d2088fd0645923b3ccd375e96f8190f70a3be7e7e98fe79e504e5f44107c669a99d2d863e26d26e17927c93226d313539050f2d8384e8ff0a6e17621c9e9b8fba7a3e4f15c44f0fecedd643540fff42f8187d9726d941f3e4165e21c441b672fb1a6359bc4d3300612f7367e7dff55318dcc4184db4ab8deea8aaf9ef6f3ee3a958e9a28ab0b4a3ee7e01c5b599e80d2a7deea58c7de68bf3e5cb338c5cda9e1c0105fd883488b5e1d70a0810943fb553d7939a91a431b0f9f048300a20b07da9dce279423600a644535e7216f1313dd06d646f3ad8f38cc63eabd2e628ebadcf96a8f15b918a76609a3da015803db83884b42d8d7d8f0aa66033539b24ec9e3a5442e15869eef43dbc8dcda56b97dc91a0a02e43826d722bfa244431785677e0ffac03724d4550d0f799b2b4cb440bf1bbe56693202cffa6146f7659dc1a7bbee1d1a7362f4da4edd05e60a2aee607f3665c94a690beaab3a92eca07a2ede27768d4d72152a93b38bf3652c182b10be19fd0ff1206fa2daf46d044769f355ff538e5e856c2803a89bf745a81cc055d675ebbae8e54ebb50e635c3ec1158a249ed3d8fce51d5979e3bf4f25762ad980c9249cdb2eb4198842ab29c39e9052d4645e08b42ceac9f2feebf4fcdd013ae0fb5d0a802c7974946a2f18fc88b0b00f4556ef3efe94e36e6d09d2b4303ddd97550a9d24d2961b97e224981b5549b7391d001e140802333dd867afc3169097178992c21a05267228ff6511ffd1f230bc83b8759fb3ea2a82ec947992f367963646e1a353443c5ce409e20fb2b6fdfdbda7c16816b9aa5997e57a080cbd70ceb60add297cfbc7381cb14e899636134544287c6362da38ccfb78ea07c4c321b15d8535e6526f20cb8e401eb4775a87eb5aa80e250f25e47412bf2cdaf2b2a7d56e640465686d3ec18aa8a02291f81d5bbfd7a6add172de64d7a2e4a6b14dc058833d1c6afed626113e8f41e114662d9dd59b2c7d592961b47ab7b51210a393e36bb129775669d778b79aa9e5e46b1be4e339e5009430e11d63136bf5cd9671beda8d33fc7cbbe420d654393c5f100adbf9985b0726585a4bfc6fec2ca9af95ff0a11b09aafb839b32c2e2097bae4c70e40f36c0b045005ccb67c5ed727f003300129e728b078a776f1c198665fbbde1565ccefd3fee5cfb3bc7e47832433f3b635415beef59349b500f719cea431aa0e080a4dbe82e6eabc75d93f1c2f02cdefd7e4c8aaa7e547abf7f69c2f393d1998925d313959a0b5709b85dad169429e93dc158e74b92f52e41a262fa333cfcd23944f35ab9b98bae3ae5a0700c440df254f26333a546231891880d0afad533ba3cfeb11f38c5080624afdc594a29617387e756b2b8f5f238f64c087fa88b0d8f2d8a39612ce18e91201770f0367b171784c42f4938fe91c962bc670a9b6e321965cad6530e199155d0495a45eb389ea8aa51d353635da72e28da898b0ca3a016a64691964c79a812bb218231d74bb1ea70a9efdec377ec49a37e6955b5fd8a0137558192526455b15e4fa934c979c98766b6f6a13a594006796e01762d86eeb2dd3365f6ff6f8c6868d67a7dde434c8c1989acc67c4a85813bcdaea3eee22328a72905a685e9210ca988b6f2f22a0d34fdf7400857d96fc997a7e948d8766405b3a9d7da42e6389eac9942f3b61a39d832d7179b2a763d0d795fce49e37d786234dcb8a96148c2e2c0102889572ce05982805d26463ac1c0ea268b23dee2a8172e18c9b7a5074d4364f909a7aac30854756dd08ff800dd973bba199a0fc840c3050f2f0c5056e4df339106c21f7773ca4d37818630607ab53ed4577b8c5e126c025d19b8e60978fec9a43bba9545d1e6c1b8de16fcd9f1239c65bfd078890a002e0ef9f921d189c27aea2db63f2d1967ba0a95495e10b66326a1e36f35da178920ec677916cffe0fdd6830dc1126e6df53f83d00f2830acf3b5aeff61c1ab4309b505a5d0b7ca750e901ab2122ef15234b45ab80be00508018b30f2ceea01b6381cce47ff6a4d49b817c201b9c07b1d759d968b733877188ae2e363d36c0bb2a58d7b30fb98912046b0d41813a005c75d081676317b5c3825229d32c1d28c6798f6593e2b04191db8947c3a1b808dbd5e876f0154a9a358ef5c7e34ce49795319978c89a4973bf087cdc2a25de1dbaa5b57842d442736f765740ac01a75321a0b8fe46ca5b48669f551b3da194edd19a53590fc2aee8326f3ad223d44592d4ff610b2a0af87b6b114b1d55f64b9f909ec44d5822f7c39afc8ed1e4b91471367f32905d9352ff7686ac80e7cea7d482b1db044fdac6bdee26ea56e33d7fb14d8d15f58e898a9aa5c5e0cd8cc741de0534da8b3f2dd4f7b64acf5257611eacf04c88ccd80df513c1bedfb1f7c896b837721a787e2ed946ab4e0992f25da27aba9f0abfd06826bfffea6f18ac0470835cd4a3f59e2f5a4f0a5dc219b120635d38f3aee637fd4c48b27d0b191cc5462a5dc460cf7debcc200b298362809c282c0e9f8fc05132fb7338d22838cba9572e7fc818b103e300868128584b161da3567fff827e11a42d15663f868fc9f33e97acb42116248d052d1950c5e04f0c844d04ffb31d00b4d9ec2ba7584489cea75de74a6d419b120bc602a6cb54a765ce9c52a59df349b879dca2de8d95a40420983b83b6c4169e03dda4a56b03fc742cba40851ef4bd35d44fbcb7db1611888351981f35f40c7b637bce422ba09e05404bde2343c47460ff5eba3124fd08868e3814aa471e16362eab76f860b3213da2be31586e81e184fed74678b63a6f0384894a1e8737c0d2eb317f2b355f1eb81f34b3e834fe52a9abf1aff35f7d3ad41f888074394a76f60dacc8db301a45fb75618ddf81453f649090cb9ca5b38e2ca3e9f36878e87784ca7d0bd7005e66027a1248c89fcbb0cd7c228afc35a9dc501dffcc5080e9d13959e097c85969abd71bf5012c19c4f8d4de970892989981f7156012fd76a3325b4f1f7b117f4b816e663c8f70b335dbd495bade8f72f58a85737932181dd0d79c3be9430a1f29975b575238f481fd8e71e67a7d09c098a59151fe5493ee2eb75c1e16aee789fefa571b5851091a6ffef4f6de8d095f71a6e994e0eaa2709be76c349a5b491319b62d07c4a7573aa4b16935953213794881c90225701c5cbe5cb842ecfe20df9977eeb4c216501415b15b7d80f76fe8c216509614799e73741c2791623c7f45a6de59810fd5194111586c09cf6ba88d37d2ecb3bcd398580f7408ab3beec53f981130976e790e285940ae44ba577affac52e685c6f6fcce3dfb0b0c76705d05f6da3fbd46f36b36b8d72d721c6da2d1763ef1f169b971eb87b0c504d9c08bf52935aa2323ff92bdd7e62dde87e1935a3ae4e89cd604a831c728dc6b26e326da99032ddbe378b4963f84f4a19218d999d92cc5e304066a0aa68a939effcb32ea0fa539de66ee07b0eed3914839be073c03bd91a4f2a2ce4aa5720acb0975586df6d76585f79688a5ca446148d768d8deb71de6c533485e1b5132b546da4a9d2765bcae8342aa8f0119e430f7ff94c946e111fb404cd15c54109124c74bc3230086c766ac7447bd52e7e51b865b93616c5e3d6c8195ba2c375757771770b7cc6bbe6585aae515421a499462dff1a494ffaeab95c9e17d0035f92c3befc3e59cda0e64722b49bf2bfb10d7970cbc79cfca40cae9c84dcb3cb5adaee4ca4ae79dbd2771b4538f494ac72afc4155c076664f8345d984268c688b355ca0aada5ef1e1c04d5efad5aea473f28494fee61328d0a6f9112d9843f9ae6778eee5395a724335b048caf420102f038b692a978263cc6c06ca99e15464aae33a22a0b35b2d42cd7213de347355f4168a17b59988e84df88c5aeec81fb4697d66804a9bd1880276026538fe27ca5b99c3192fb3d40b35cd071e9cd7d688bdc865f257a6e71eb841483d539155ebbc431587f3544512a4a7705c578726c8594a5419b5d1a4a67b128b352138ecf4c0e8c08d1c49943104ed7767ab1b0171f07701d74fde22843e778d5067d0418125f744a9bcd733ce5ef06efa9694d822a0174878f9392bbf76a8aa4bf99d570c5e0e19a8a425f374c5901425613717a15a3b33a77d3485a60e60b3ed380d24b4b1cbd3a15b02555e9e34b6d325e1d26cd26f0d911b6f33291faae6b66811037ab28584eafb42ec3bf87237b1b284761ba7dfc88032eb23878cf21639ee8984023c910118aa9246b56827a60ef9e2ecb52d1ce2e53ea8c063814116584e578ca5f3ee72081263756b512f4bf5693f683260e62d5208fae6ce1adb06d5858adf97778159be3c15ae132275d2fd3ff65f90913e5de08168acb3198c1d0653ee0fcc929dabacf11eba736d88f9407869970846039e075756e6bb96c18bfaba55aa128bd4b809d6e4a779655072cdad392c95a1b71c1be5800a345516570b7eee523b1a8522cec48c9a881da4052be1b3b99e63a58521296bf25f233b15bf1a768931faee9e139921d98554aa067dceb51d6aadedf7b375309f3f5cf2a6d21ce51dcd8dba060a5d852f0d79ea94aef4235db928616a5f35e2e099636a269b30fbcf3d4694212e40b951730ad2db9a507af20f379931bbf309843875a586a0d4988750a7b1b1d1db41d1910a7a6243f082513b0d6ccd57417cd5b8a1117806f9995f8735ec4f57f99b5ea33a11a590c6d9ef8a7ab1b3fa719732e0e09499b131a35c53a72b46137a1a50eaaba5d6fbde63a26949f92df638d296bce96ffe324ea023f2a2092ccdbb3b621c88ade028d290ee57eaf1d70fa0be036fbabd8dc66ef324e8e8c73f1f603aa2aeebd572be9295a6ab757eaed8a0793315aa98e92664dea88a772422916abd9cf73caa92c0da2be879b8fcc5edf1cba607fcd20a6e5e10463351f297b49aa90eee2fbbfd3d76f517bdd4c622ff33794495a614268e4c5b3fabb7321a1e752957a629779f97d258ad19687a3b9e62c66f6fd3ceb013a7852fb3db1b3a9cbe4"}, 0x1009, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x400e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f00000027c0)={0xfff, &(0x7f0000002780)=[r3, r4]}, 0x2) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$sock(r7, &(0x7f0000000580)={&(0x7f0000002280)=@llc={0x1a, 0x4, 0xc, 0x81, 0x4, 0x1, @broadcast}, 0x80, &(0x7f0000002640), 0x0, &(0x7f0000002680)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x80}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}], 0x90}, 0x4040) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r9 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) sendmmsg(r9, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)="909bcfe057319eff505bbebeb99f7952f8bd12fe41eadbe6e50ee4029e083584eab5d3cf5e99b29badf8c88375406d0da89215364a2c2168ab4b334956d874c3b68d0c0fd4558d9a1deef5ca30a18e20bb0a41a865b55ab1cf9da44c270c7bef87acf1f2e566d174ea74522586fd5b461284146434be7f1265738c64ebc7f734edfc76d4c0", 0x85}, {&(0x7f0000000480)="3d39f6917d2a7e691d674488cedab665527f4d068fc3d0a299cf5ad4e75b4ef8b417c5ab0031999effadebbf336cbf9472c5e57fa5c02e58c2f0a2357e446a640678591b94d4269cd86b7d563b57d7dc1f7080a5f414d0cf1f1d05c42c7a308ffe9d55c83f1815fe6f8d68795358d6271db79f13a3022c39fd60f02111f21a04f6142c01124b1202002d9d6f", 0x8c}], 0x2, &(0x7f0000002800)=ANY=[@ANYBLOB="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"], 0x2a8}}, {{&(0x7f0000000880)=@in6={0xa, 0x4e23, 0x200, @empty, 0x8001}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000900)="b6b9e5de9fec08173f5ad558fdc1c9d6c54d9b28b61c940b3236a23975545f7e73a7b2cac994caa36df3588d3c366f72241586047774213850a2c66a039829bd861945e8a68e58f133f8d656013629c860978323c839cf30c6dda74dd43d3df78c4a3a7dbc9a989b384cb8abbde6a46960f135f5046d6854f13f857c098c6e8d1c2da704c8e9aae8ddbd399a8085a30f5a5010d06930", 0x96}, {&(0x7f00000009c0)="0d112f1df137936de17c57be3ab04c7a1b7ff9b3cb71bd40c66695d8ac56498e2d8e0a14115c0950255ef552f01f1bfac78f814a2c6acdb7095b9e5aa42bca109f0f195d75572789310c38ab8895395170c257a1b82a5f5382f02f3b699c034e1ba0befa3d4b485e702ff8d7e4af1a75bf53962775a31ab92660bb", 0x7b}, {&(0x7f0000000a40)="3b379d449610b0776420eddbc1a51acd3dfb36f503e31a5a509d70302ea0c83bc358768fec66cc72e63b223a8b7f803f9b15cec4846bfff4c15e01fd1a16cf0dc7562e01a13f2d4d3c34cafcee50cd442d576492f75a3deae01837e9f7ad43b28b0de6c03618a87ba2937c7516e78c615208a67a0a64fe0c68b364b6c6c2a9b033113a8824e17d0af7e35b54e8a628b4bbd8591ceef0014ed2986807f2e44e97fb702d40f626f06b2524c856434736686db096ce006a44dc3580948457d7758f9ea88741224fb004202418f99274bff78e51fd26aa45b1b7b5c724bbbe832f9d84f634ab9914290bfde9e4e79fa18aafbe92bee566e84c7869716243b517abbc611da1fcc3df72f15919ef9808be7724d9ce94281c83ab6feede2b1a13949db8912633a6229ad1f07600e8c3cdfd6d7eb4bba5bea5bc8854498e7617679b88e5c57576d7bf84d395ab7b43df9c071fe74d212c86ff630904128acff3b20be5d97764fa9d074bb9bc5d88ca01b28c77e6207e6674fd6c871aa0b71980ed8b09c4b2f5cf107da38dbc9282f94d5d551a9ae42ce891895a0b456a8f677f1c2175587b9880a7f02c2df9da1dd3e6c38c7de9d04728d9fedcca5acc175abd5bb0b08a5aad3612d88dd9d2f86228984d40825d6c5ce222c1a7f3bf5f7135e862c35571739b622c439c7d452496437c7af9347b17a0752d5f6485e74cc3507abf4bf7d43deb20c9f9774455c88fd05796a537c7b729ac2347ef4a3fa862758ef3ade9413479ddad8691dad2f920ea63c59c2ad70901e88a48dac43143f8f017fe379a71cdd05c63b8e308d0b3babe6fef4b4ba35a85c90dff3427ee4fd1dbfebbc6ec5b1eea66c297afda6d24ff659198ccd822d5ad59fe8121a60a59cdb8f9a27ac73a3f960d53dbc9de6e56c2f2a5ff6dcba4d981ba547c7c984f1a947f13642d63e1f1122d89d0b7a8477a358b56d0ea66a3b0df2b78022e160e111106ca93073f08f6b6085ef2a6586ded488d71a5e712039200274176d79a42855c19ee5af7f1b56fa7e406043fb1eba2bbc51d8f8a77104acdb8511d45ea50dd8d9e3560c8902fec45e06b5350d0ab0c141a93c2f5b46585d4ba21333d5379d65c14272f0b35d6703f6bce73f7f46b63c15b0702b2a57892319f87f3374990991ddca9e7f43aaecd3dad829f72e6c21a28df90b889e658038bb5c34b055b724215fd73879a08adc0fc828ced712581083e6ae4bd32ebc529b3138346431fc84b4f19792636846a4808547c9853121c0a429185f610f97bf6e454b310631d27fcccda59408852911a505979d8501243ca5e741b1b8414b0031e992cecdabbbad149283d61b5c3de07ab7c32c4bbea7496db13b9570bed5f865d2b05ca7ac0f82406c87bfcaeabc5f96111a4e404932cc47eaa76437591d5e257386e610f841c7a0a3ae23f04e3f2a9ca74a97d4a3ec46db07362c2ddb16177141fde481eaa9cc366d1754472800f12bbe693af0d0f4bdcfef56268b169a23252622d7666b654dc98aabeca57231814f45ee323707c6e26dd9956a21b70514e436b0de6245932866ba29fdbb05e24442454af3a905b2401136d9319be61c0d66c20c97c37b0cee37dcc5d91a7741f3f06609915211519e936b3df15500d8d6c31939c575d845614fb5990bc9081c64b53480d961833d1e1ba3cc9a48b2bad16e35d58ad003f6115a65d2fe207df339b69e030dcc647e0ba36dbc1093ad7988c61aafe536ac644424ed5b5341e452df594b006cfa9e917bb16abc8e8c8528546b3b58d217c54aec043920ea4a75683e80fe009250957fe5106600bcda5a793d1d44276d7945850d6737b066902e6a81780731184a18b97e451d7775d567513103afc5d6a494f95a8f5ec50595a67d8491659676c2852590fa2b6394842676de5cc467b280ec059fbc513fa1f334b5c972fafbf5db6d06547a1fe64959015e3f8fe4688ed8e0a3180163b9c9e4e95d100413b93c071a3148f3f85cf10361f0651de8e54d05eb1af37c5df9ad34fffdbcb1ab3320e3d209e7ef48b1219a3e8855101169412f28a76e6df2ec364ad39ecaa98704ac9d381479f808a1b62cdcd08e6aeed2773fc8f9330d3af02f88ea420a1e0de43516686d186d3d4cbc52d9a3c114a47c069edd1e5e49570ec513b596cd59f2c8edd33c01e0d345fae92b85759a1813ccde3e1c428487a44c1c09083af3f4e060632c208ee2ce92cd21157616c0643863e8b459ab09eadccd425081b6e7421dfe061fe761414536c30c5ea2f49308285ba77f044cd634a84f53d2c3411375975c3c667d32e0a6e27d5d8d094c271b60ef8dd075394cc191743d715a0289fdf92f696fdd9e62f7578a44d08f1c724626fb1fa76c67fad39fd4f26334e34fbb0c2b2c44ccdd88dd01c81b643a14e1e37279a576870a609219367c278c82daaa6b150246e168c8a54724881c56d0f59ca61ed827aa165c46cdd1bc2d6ed0c0f47470248891579c9e4b2c553051b1052357c35a0d5bc9bcce064915c47f3e68f5957ded89dbeb3a0205f15787de96f5032f8da8f1d94d5c56a6442b572ebf2c381b218932bc27e5f243c4efc98291010e94c5a70f8064a3d019e61f157845700b64955e7745d56c64a75b59d788d62222aaf005db5ac3758a76110d81b6d1759118caac4ceef96d3c456519be5c006e57ad04d581eb7a9a2867590d7be79ac43e4c89399689f37e5a49074994d28b0639b3cfc3fe59382dc1cc5d1feb5e03bde7dcadbda4cd0d621637346928ea13300412bebc085a6c99da0cb3bb501a0397dcef6845128cdb747088528f8d85cc12cf02e9fdf2f9f97a2c5f0119716976d51945e215e258e31a44a3bed52e2dc3feb9d9b1761f9394c3ea87f861552e1e72a06678b73c0743a9058f27e3445cd44e8a5ed6ad16314a592cfe3c3c2b1699307c07dc2ad106433554f85c60f827ad2a0b0a9261423bff3510f2634dca0b8cbf0ee2c9dc0f7ca8d1e11cc648e8b9395a24876b343b85a41eb3736c6f0f6e463024eb98d341dd4ba6bb755f4c92f750e9995de708c88f63710188616e21f95ff55ec81030f610de392cf5986e7392a7fefc92254d834193de4b179b57db5bc9dd2427c9dfab6faa8d5494d8bbb2efe10be633841cc1e1a3320a659b072c69fd98d7605f15394b3b137c475a30c49c411f08cc6d38ba4bc9ad05e4b5d3e9801fba0bee6c49db915cf0c1a693e1988debcd0c046589824a53b6ba29a6121a016d8efad4f60642fd1c61d5a2a35cab7a0001e51a0bff3e3667e5b24c0b5f6fd7277ea99f612d8e7ef9ef90517658930c1c25e69ad003c4f75299f336b489dfd8f8919e8b3f1b02a9c89d704d4793af8b10a006d24cd737c93976d82a229ab817122eff9264f50016cfb614a4cae43da653496fa2948aac8f39925d0fa0b66b52238904bae729c4f07555c4c6682ae0c2fa5e9a146f2fc16ac4ae531304ade6c902b36391f0ac9358adf875a67162d0b17dec78243da53a7ed524f375a25a6294657224a0efd0fbbb4eef877f8f49632cd85535ec45d100a3d5537ad554d6185f507f5b81f603c2bdca23f60d2e5aa66496496dcba26aa303bf2ecd2eb68f3fac3bc3a9a9c20a568fac79edee82cf0c2d417191b9910e50bf86f67e895df366af01ece14d6f2e8c19bae86e14cb88e52be9e681939d541787e9263ea17ae7c219d1256bc8a0c25ca811a73db21bd2a7a3c7a27b50014ebe976db31568aeacc1bdfdb1068f8978de7b724ef6000d76e79c659c8dd64f7b264a7fecb440e0e5fad6e6df513bdd6580efc48e9ab96098ee187c3e93a72c2955b4258658281422267d72094163f06e9c6a4ca5cb196bed571023273adec62c324777617be21570c126e1a2d810f77f72862590aa52c23551c38dfec00bb9a8606f2c5067e8dda142b322271d461d3bf1eeed02490343d868c05e5d1180df7945568c154b816509a66031ca7137ab5dda4d9113b395da796f10b811f72db683ebf9c1b6df78f5af3909c618d1f0deca499bc2f33dd8ca129fb7ce1aa95e86296a45b6c0dd23e8b518f4d5f5c4eded68e57488badcd2831375add6ed39d152330cb06ecbc0d3c425e40522c2877156443bdb093365c8c55a16d1bfe2db127eb7bf4651348af15f7d4e0f0b1f3bef03ddfa202a004e3aa973f216fccd6a213f926ce389c7c54f334071d6ba1ab9c2b22ec32e4195d39fcbb3bd372d78db9e3b2837d5d124dfedb413f4794f22c9afc3d642f1fd8c0636c64327247041456c9ba40ebc1872904b093d87754c92b9b7257e98d5c4f126d003ce643d11bc4b7c65dea6b69d30254da12a917b73c1ef022d62d1f35ef1bbbce445bb244cb9eeaedcd5dcaf72849955e04d1dc492dcc2d70eb23f3ae949266ec268dc015efc0527d1ef7e2eef4dd882aed271e027199c9f5258d73479acde0b7e9f19bf4e43b17758807ca49345e98351c2cfb1717086fbdba8b2b92a4cba53a2d0532576c47c187fa703c2c177ccb3cc3bf928bea1303a310ad17a3ecf59568a44a937f58ca2d9431b65e35668a1b9226b8dc33c68861af39c4a7e9ab779d121dae44979256abb1170b630d1670e824c9d71baf823f8550719a3ba14c724ed549ba05a05ccf9191afa10b2deb1dce72cc11a0e03c18d12c22c83c34ab32c00e3e74603a3e039d5d08b22ce6c1d193af23a3be63663103beb0248e36c5859813b083ab4a2be90a53e5faa4954cae3c13db56cacc724cad62e5f6c02301cd75b9b32009bb362e87c8f6f116b9b41220410051bfe386c422253c3de5b2138511c5b0792d04d48aa6c18a7bf5349b53e330524ff5b79bf7b6cd522de0db856dbc40cc0e377d368ae4d7fc7a2747009c5a002dbda194e58b54ad2c932d6b60f4086d65be3b73367ffc653ab50883b0be3420b93397f2dca7a8032389fee9e234b34dc981954b07639e84e004ca93a6b9b4e0705e0070c0096b10f5d4bcf74372fc3dc636f219dc346771cc66ff4eeafc8846a92aabb7941abfce7152a4ab32cec766b1ed816cb6df2ccb52f101d9b00026f4155ce001e5da2ebf4a3a974643fbce4febf61595f11f14b6422e81a083c460da52f7179d76c5e548b7141a7d56b01aa1454d9dcfe1c81667a2d0b7474d057e08912b75d2e7d1a1dfb2844e65cb21135c284423daa73e8b7f10a7a6b9b46860236fc8316922c4ac7defa9b0e5505621278b0594c15586e5842b1d2409241bccc011a957654964fbd0fbf028bcda6689808deed29154370973a40e822249e81ff69583c1ad0dff7521f3adfca35090761d1154287c2ef31c310bedd332487b6acf79c498ad53772158100b976f5e4bf3e1e6a2b66db7819166803101d4730fafbffc58c1dd2de0d7771ee309eb437f642c903ca90381c1aff184cf870b364e60ed1e8e2147f5188e668ffadaac504e1244a259f47258918c46cbae48aeb62c1f972606a698d5767086507dd0ce13d299aa955898746d075694e9c242059a2422e7b3e62ddae7b3f53830df04637a0d13bd7df265b3d5842fa992de6b0f375fd13600e6a8890cabfc3ca49ede6c3f4c7b10a71b125c522d189277943ffd938d6afd7e56d1060e03e8ca7aeb4126d79ad480e11b658e93d12df2c111a9ddcefaa78ad24cd15956765d46b08ac196a75aaed070c3889538b4c1009ce8e297f734c0c86d070bc374e4c16f5fecc958a004bb36deb141ce38384f1ed33753970cb94b209f87379bf80c2fbdfaae9d61c97b7d147d38ccf85c2946122c2767baa9789f1d60282e85ab", 0x1000}, {&(0x7f0000001a40)="7b82b9693fea9b2a6eb4d929ab939d6e6a598d8065052e83a2a3c9b47cc4a1821a87a58b21b269e5ce192082cc3ce83cec4fccbacb9b1843d4400f2d8e2dd6c8e68e6e74d4618bd4d53452e4ba147e482931b8b563a00128195df44b8e04437ae42924ae0a05aebc2c167b99a821623e6a263e6230a026ce08beb988223775cfa7911195adae2eaf4b1c25b3cf246b8b9b32338e2b56a266ab56ed4c5f34b0df76107774fee157cfcef5277997e1f66dee574475fe077d1d98a12caa5ae531b1a94dce33ee195c4ccd02c8614a5968ed8d83", 0xd2}, {&(0x7f0000001b40)="6dc5cddf35168b3333084a0efcf42dfe9539d80e71198bd30280d4cb7cd0e64ae87212983fe6d9f8d14b39c028cbb74a1f95b17288a45d79c85bd1bf4eb501e4a9ba15ef06622da0cdecad7a02c8eccc59e61526591081360d2a22b31b5c189bd072663e90f64d63a4b30720f63b103a2fc8a97f", 0x74}, {&(0x7f0000001bc0)="ee3e1f5a976d99a5c3354fa962f77c48fd487a0e4204de090376e5a4820ed04ddd1b4a0e282cd7dbdb2a9dd5c3d2ae501018a7b2bc3bf55234c94abb26a132269079cc5f92ea97acb9d096e29579f70d66c45d9c6a9f95ad9b3f132058110ac3d08ede43bee11faed3d01857b6777f3324941e9a0bccc383c279182438aafe7fd87277a945e84a61c05816daa29f08d764", 0x91}, {&(0x7f0000001c80)="d8cea9cd8848eda6e844c3aa5d6125ca5cb7d9c228a5200b25e0cb6f013048305e8d127741f8b9e2d620d41f8eb9d1e721a2c0c2ec0be803b97e4c18413a37babd89a75606a0e098c631d59a65efebc0e5ce99d4a51779859c5df4098e65cb24d1517d259418e4f09f0a885377a9b7e02f87b1e588d94d29d1ae03efbbb4109bdd50d7d98f5e5fbd5e3c2028dc9ab7e567d084440e32f988474bc24d117f9d6596cdb8f88e440f6befe3557b8df955940288f5c0ed4d0d1efc36cfc1546641b3ed015f6c0e45a46b17e85eb121e50d86ce2355f84e9d682d7e4d5d99c71408c26de390", 0xe3}, {&(0x7f0000001d80)="8d456d3110275486d388c14a2ef423e94721e3f13321b74d421f3b577df810ef0861f7c753d8fbd0bebf150b5cd5232bae99fdd69123df0e419bdad32cd8a48075ee014c596251f89d3687a202117fbe16518302ca2e04bf6a7b35f0d6afdb4858b60581df9772aa28c43eb3771cc3cb6ebfcedcbc09cd6e39f9bcd9fb976adff088", 0x82}], 0x8, &(0x7f0000001ec0)=ANY=[@ANYBLOB="400000000000000000000000001000007c2f85e48025c2e27709fb3ffb051e8bbfb1750b7cb71785d0ea9352bc824a744fc4c069c0f5c94732e7300000000000b800000000000000290000004f0a00005181f3e553c900aa4dfbe631b9204100758a3e9830f0b6f68c9c40c7be0074c1d82187a722a15def076293315bfa9cf34f8bac2d596e3441ea3b4f9a3ab4122331ef44be6b54525850181c9e2140fc398fc4b69d63be6da56ec31618c49a83add509d20337c9a6d29edaeed4ba9d586c295fabb9e714374c07ab089961b2bd51ff7dfa8200a9bdd72b6680807df66f93a9024b25c58b97e34ffc8281a2a17c68b06400000000000068000000000000000a0100000800000044ca968e0092e8810064b072560492871a6af33896b1969c243d8aeb1568c225eaf8543f9823b41979c0c7e8019c04a57239f6aa041ac9be2b07ed21443dfe8e4db7efd2435992e9585c62e23a809a5bcfafe0892c00812870000000000000000801000003000000256173a2fe187a6cadf149578439a862d72130fd3b2320093ddfc73b9f2f8372100f9f29f8603781011b4d4482bb0df5b1825b200ff13b8b68bc8836fe9cabba5177bafea73d4caf63be47336d970f1a96903b17ba768ab0cb8ca1a592d800009800000000000000020100005d3d0000389ff69faadf3a4db4a308967c64ca5408a16176bb80bee30e2436823602455d76a8d404c9f754f4313f49aed3b9c74030a338f0e39ba308e278628610531ac3a9e654148956a30cefbea52b134a702c95b56628ab8f1369de6e41a4b379ec62c12576e3968ac63a26c59838d6196c046732a932a472e0f4f079997460a426c61d9501f8dfb31100b80000000000000012010000fcffffff293de9da5c06fc19704158a0729b669d6b6a98bc0214dac52780972920cf3c045e6b454e2a2b3c37283e95fd913d471ce79af8e0f9327cb5e381f550e00ead43b1d63ce46a8cdc608f30d3879ddf03f7f6e75ca2f8ade4fb064d5ab1ba2d6526b8501a0c1b79b0ea6741a75828e16c50d8e0ecb358227e8ae16f6c75757cb894999393fa6ae77a0d123cd7679f19ee43557399ec6f03a1797989da861a62e097e9d03d0000000000"], 0x320}}], 0x2, 0x4040090) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r6, 0x407, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) ioctl$sock_inet6_tcp_SIOCOUTQ(r10, 0x5411, &(0x7f0000000540)) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r11, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1579.426842][ T1707] cgroup1: Unknown subsys name 'perf_event' [ 1579.432991][ T1707] cgroup1: Unknown subsys name 'net_cls' 11:34:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0xed1c, 0x10000, 0x0, 0x5}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x4d, 0x1}, 0x7) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1579.697366][ T1750] cgroup1: Unknown subsys name 'perf_event' [ 1579.704466][ T1751] cgroup1: Unknown subsys name 'perf_event' [ 1579.714075][ T1751] cgroup1: Unknown subsys name 'net_cls' [ 1579.716305][ T1750] cgroup1: Unknown subsys name 'net_cls' 11:34:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1582.156737][ T2981] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000140)) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f0000000580)={0x0, 0x4, 0x4, 0x4b}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000540)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) ioctl$sock_SIOCDELRT(r6, 0x890c, &(0x7f0000000480)={0x0, @can={0x1d, 0x0}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @vsock={0x28, 0x0, 0x2710, @local}, 0x2eaf, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440)='veth0_to_bond\x00', 0x2, 0x1, 0xfff9}) sendto$packet(r1, &(0x7f0000000340)="88622c4b2bb5ccc973dade201deeb584e5a1f00b307467c0baf3d2b24e3d45194b246e298df2b6d60470ef394f475333285549c90802b78f5e3377848ba1454aeaa578a3255d7e9095d6f6e1df75a926dfdf09ba4ba8936597f6ed6a61f825135b1e34d6bd73936f5d294d82c652346f004d0cf16f193881f00cedcfaea91cb334143e73062035892e8ca359a25723b073e85ba566ce1a1ece13b9d9f32ab2afa6f96a197cd98a1b696b8c270441abc514adfffdc8a2e91bd5089cacb388a1f7dc2345615470d77921fc251656555e103568ff0ce0d63d6b475a1d2d21cfd1155f2347404c6496", 0xe7, 0x20000000, &(0x7f0000000500)={0x11, 0x9, r8, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x3c, 0x0}}, {{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x0, 0xfffffffe, 0x1, 0x1, {0xa, 0x4e20, 0x4, @loopback, 0x1ff}}}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r9, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4010}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1582.905565][ T2982] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000100)=0x8001, 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d8de2ae8d32a8b7fa507670e7c82431d12eba5404b842a4aec1c1b8bca6e9cc84cab18969383941e5879608a1074bc4a7de23bc20e15535b099657bc013059be3df7ec35655761a6d294e8cf6b25b8a2097cf78f7365a3a22865e944a013155ed125d58dbabdccbe83c61736a7c0781ce", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1583.175605][ T3010] fuse: Bad value for 'fd' 11:34:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f0000000240)=0x68) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x2, 0x2, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x400000000000038, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4011}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1583.876007][ T3006] fuse: Bad value for 'fd' 11:34:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4012}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4022}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1584.318819][ T3033] cgroup1: Unknown subsys name 'perf_event' [ 1584.325316][ T3033] cgroup1: Unknown subsys name 'net_cls' 11:34:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1584.569360][ T3106] cgroup1: Unknown subsys name 'perf_event' [ 1584.575620][ T3106] cgroup1: Unknown subsys name 'net_cls' 11:34:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x1, 0x7fffffff, 0x6, 0x7}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0x82000, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000400)={@multicast1, @local}, &(0x7f0000000440)=0xc) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, 'netpci0\x00', {0x6}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r7 = dup2(0xffffffffffffffff, r0) getsockopt$ARPT_SO_GET_INFO(r7, 0x0, 0x60, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000500)=0x44) fcntl$setpipe(r6, 0x407, 0x0) fcntl$setpipe(r6, 0x407, 0xfffffffffffffffe) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x2, 0x4, {0xa, 0x4e20, 0xcb64, @empty, 0x6}}}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000340)=""/108, &(0x7f0000000240)=0x6c) [ 1585.249784][ T3375] cgroup1: Unknown subsys name 'perf_event' [ 1585.257575][ T3375] cgroup1: Unknown subsys name 'net_cls' [ 1586.752312][ T4217] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1587.449577][ T4295] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x1, 0x4) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$KDDISABIO(r2, 0x4b37) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0xc0, r5, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xe0}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x97b}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1f}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x18}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0xfffffffd, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4048}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1588.026172][ T4316] fuse: Bad value for 'fd' 11:34:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) delete_module(&(0x7f0000000140)='cpuset\x00', 0xa00) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000740)=[{&(0x7f00000003c0)="2be62afb6252085387b8b56264171b362350d17fc3ca4ba5227d03ffa8c6fe17193ced5cbdb22d62b77aba4571d79488324f75d4acaa8ed6e57a4dcbb20f7625f7a12a836f9a19be7af823fc0a597b05a1874d04419d0ed9d048fac695faa8222da1b7c7248007275e110f1e31701d0bbb5cc25aba9550ce60b5d4eba2906501c6594a770f54a81824df6a9a8c738d1734f024f14de5c0adab0c04fa68d21c2eca3540f0e4acd219", 0xa8}, {&(0x7f0000000480)="440659ed9fa5551e99d284f45b42e61a44d945860259c71e3162016d6e33403c568c979e698d97db6f93dc4c489ab374b11df3e0dba9b879581cf91430895c80c10fb2c8ab3b9d8943c64b53ce5a673e30059312c85b481fc5dcc3f907768d30860402cf265f886400d96528b3c2f9ae6a7e6b02a8ab6bed6a920277c1230a212ac74fe6c4c7204a", 0x88}, {&(0x7f0000000540)="8220609f71e43099f6a588e59a1c7fcd42db4b51c6dcb2cb1afaf1eb1cfe55b3af19f7d7a2c29d9ff8788c21fc7891fefbf1f7cd3ad80be40903cd846e18e964b81a3e5430cce5d79da7fce3a85985168e0c2c245e8bc3be2142df76b9f7212d697d", 0x62}, {&(0x7f00000005c0)="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", 0xfc}, {&(0x7f00000006c0)="f1109b39e318e409f929923aece375d4220751798d7030d2daaca5578ca7cef8c44e5a4d3c322f2db1e0c30ed3858f6ebcf7becf8decc0f438108921d3e5dded16894d7eed46006a54470e9285982ec8aca1a23bcd9d5996e9d26062743cb7e33016cec100aaaf2939353df7808b5b5fa476d302062cff93b7b8", 0x7a}, {&(0x7f0000000880)="795d1eeead0e4099718f6f0835397b8d1ea9dfcc778b20ef612c275e4cbdb7a4b216481b4e40a459334a0c022f4e9e74c15eaa5df778cf890efad6df830c86696f968a4966ea451fec31fa00e9880c9fce9135e19f7f4af7d2ce461cc0e47911c9318118b773dc618286b7c832c1bb9dc7289025943185cdc3438a740c8d4d37271006dec93a9a20e8b5918f382346f038c54d56a4dcb534d50400084fdc4253e3bb1897bfa649f21a912d4b6baba049837408d1cf3263500ab79d469b447b2911d9bf3aa1ce5b768ad0694ebe26182d000b3c79da476fc1ccbcba627675770f36be2abfaa2971e45373c49e328537e773397043d631d44f76946b6b3fe16474de2921ad56f804663809558788bdaca320a445db06988fe7b94fc629f1a2adcaeb31be0e7a2cf489615ab1a100134e6284e8c444c0201f1e427b9b9d27964aef4c21ce24715e0078fe2ce178662f42fd6d19695403fd030d70c304310e08737542447b28632553df42c18727871cfcdbe53362cddd36fd6ef42c9a0b5276f9bdc8630f572b7204e21a5e004aa7a7a17d8340715d1120cb83fb23c156a2cf7b4af49260cbd1754ffb15f0eb7e5aade3792591f42072777d64bc7731ec8e474fbeb87e42ea71d82e8690c699c811b20becbe0a7360de1c2e2b6cfd88be51d3138cb47afd4c14142b87a5d6b6e4f4b0615b850be1311024b6e215264d71448a11dfb56cfdbe9d236e077ea3464c2f4eb4ea044ce5186c2686f0272d426511aa9092810ebbce288486d6e824a40d37842846f8b4dd5fb0b5fa92e2f843830263888a1a6719da138221cace6cb4d1db1f16d64bacc645f774642c7792e49a9fe237bb5b8b0717634397749ce0cb396a8995921e2211f3b48414b50b6920d3e53fc1aef22e4fb10e819030b8002eca59f1ebbb1b72c006d0fafc13ddf03e84562d1010130e89d748573fb8b4f523aadfae6e4adc2974004b1b6d22c95b0dab63d3bfacaaa7a9ac934ed9ffeb734064ae4ae516e749a3d61cf6a6f1c91a3aa6565fea33fcc4e93c9b793c16e0fd8cc0e297c34c5202d0a229c948008ba5df05c0360444169da3a0d85917d0734271b81ce5d49454be3dccf1017478bf1ce9e290ab77c6c4c38687e7c89c10c0907b008c29d8909ebd87951697455292a3861a82ae935f0422748888229a4d05a7977609394afbc48aabef0ce7d1975e3ad8f4b23f94f5006d5a1d3dfcda9d36cd1a6c574b865860a0660eaff22b51c46209bcdc185381c3dc308b1fa90d760fbd0b20e634a24597b67210d22da0d2ac539e5660a4e037ddea973265d073fb40be69a4b4992a7d297d628cd54b64b07bb92731b25224b18f5852d7259ffaafe4508395c760afa5e00c7586e291bdcd2b857e92daa807ad7af7a1cf4921d9c150ca65e24df7dc6e736d22fa5d66fc3739a2542f905ee1b7dfb3cea11878c45ef1762439b3a3b02ad60abd151855bed348a52f00006ba48d1396a8aea51f88053f58e5fb959c9735d1372465a315f4090e494fcdd3a0b58d0a9c0a9baa421feb2949877bcbe30a196ae55485ad3f04af735318dc011a180067c24849137aee4f3aa5860742672a9841e685c743c4ec02cb78332b17e8dd08661b6f8f9336c81475696f4140045e4b36a13be1411a3bf06f53400d836fbebcadb0908592f3f76f3f60257976777b2ce4a32f8fa7c9fdeb8e24590887eb5585083194c6d06cc0009047f391ba48e442d3a04b065b39540519042369d4890ea1d330be830872c175ce5a4fd884c66323203bfe71ca4535b6b18e4fbb105d08f07dfd456a529c1fb12d5d4c33deffa8bde153b319bc859b8ebafe22880d72505ad17fb75164f155a9468909dd4ae6828bd6b66cc5a54b11522079fe3b5a80cf93faba74bfdedf2cd5079a0a316496ec0890db3e3465f242ab90094e48b1cf2820b60e862cdfc40f78f2e50c34c1d5af6dbea58f3a4b88f2ae6c248716b2ba2eee5cc86d6d8fdfd5ad924679c054f0787bc6edb18627d9895bb8fc83f2f0d464626eaa29c404db67419707ca4a47ce6b834658a09d6d638a56a91755d7b90a6d7b993ec06d8b816733b9a891b0530d43b5266f3f44b8fcbe84639a04cfa90ec9a81e042c6bb069b064c224250a9d76cea557464090b1a9456dc96db1b07d65fe400db76e63423e4175751b3303543adb326ee08a1bb5b64c9b6a548eff8602b03715332ad8b8b7357fdf3e93eae8bc183167460699e221bf802ec51be4865294fc837886b5e67e0c611c855c4b3337ee43011cb5d126db1765775bca9a90464ecbbb5e7d56ac2a513422b54201eb61fafe2b74249e829d97581d21e60ca06563c2036754345ad38e3106511f1cb34aef0026802e118283e9e3f7e2134c600a7d8317d1895bc847c4b2a43f774fd6faeecf48c32fd603088adb94b0e3cb6460cfd2458fa2b4175cb3c5fc2f1e973fe4a3ae621f050331778332acecd3a8983115aad195ffd37a801133edd3db45d4075a00495ae56d85eb591fb80332a97a5c327c56e8cbd283a91884ceeee62728f891e2e43c47152c3f29cf99ce23baefa9c0e36302a65b8875b7dde25ee549476b4484d8613a86120dbd4e8402a76873f65eec6125c90e0ca4978ddb7e9e9faae975b53881ea50fb1b35beef6b416ca93b276c414786076e458d44c2c48ea89a38042f1e6e783adc48b80b33453d4f743cbccb7ee3c68990d746dee127ff30f323f139796f2cf9806b25aeab058c7a9c83dee9ba9a3f0df1ae59f07e011478e34c120e5f5605ee4e0bf354bbf288291ffe1ba4ddcef00f9b13817cc1a0e5a4a113cd8e78d4c9ed3d0a0a1fea8346d1516ed3ff77cf8c95e30625167925ac279811acdb98821b27ac03dbc92f71c5cb19396ac9aa721ee948ed2df126824d7978e5df79d5f78539350effc29b23c6a03295742b21a5a9d2979472e2772b7f76c7335fe753a3475e5746f91a77e62e8f571113628804cceaefc2728073aa0d44df429cb632a1b57bb8511261fb8c2f1b05a92a826da6e42c8f3d91aad9226f96a7846d954ccb623bbebbe0f89851c314ab4a701a62494731f111c89749c72f250c8c6e2412847da9ab4f5875a4fd0c8582872074b2ff2513788dcc42340851bfb18bc7df05706c65e80814d04b489ca4bf3218cd6cdcadb1199f3f1509fef4738a19fd4719026d72ac336b9f9da7ad850a04d6d0f6cc0923c1cb3b10700aa0f91b416ef97fa5e10f19cce91cf98c720c311695c4ac21dee46e70b68009a6c09bc60708b38cda4921f2d2c9c1a1094eb2d948b8240877ac9d95e8d4fcf1babb0684d544d64b26a9da4a1bc61fcf4bd418a7dddd307d5376c2df6879e7ed532b0297b2115cbd6e7151d648e12a83a65388a112bef39efe733924d1d6e150e1b35714968b0ebfb4bb116bb80c2a79fcdd5e406868d198f326eab17698c2567e9a0b7fefcf487b9dcf593fae604d9af12fa21c6a79cf49dc93894e42dd34f4439db76ef83c58f59c50212fad4bbcae7574fbfad8f808268c78daaa764dd795daf136dcc361373ce51689fad1ab725a474e68b047e47b2ae08bfd4af3124dc79dd8a0a9fc3e4f4023c6898fe779e716fd843d7dfa2a2994bfb3d2bd72bd681e0d0556594424f41ab1102cef61c5727391cfdf9ae1ace6827ce9e534744f8a6286aef0c6a6d630f9d264e9a79f07be7f388c0d7458d5bca6d7bc8ce170313f457b726c2954b975b3997a22c6bb32a959b31f453b027bbccfdb58ba3e033908add11fcb6d808b93eb2437a947249371051782e6ed89c2acb3688653a5de9b8456f973a5919f4fbc74e0517e30aa9010a8840ef21d9352584d4787be1cb12ed4f7a8350ee5b820ab70ff574cdb60a4d8c0235fa260997aa9fed9c8e05ec05825df1d0b1c7f686e44d389c736958b6ee62859ee9c814dddc4808316079bc269f5398a6c5bf51e6bf700a789364da368b74bd3225b27c970f04f66373e165c29aeef68bc36c944d9309900249bdbd24309b0bab1c488721191d0c76329cc2e77cf7167055af89828c6e8f0ef9618a013ed32100cb9f49c77cdfc02f526b5e3b078c82031a84ee351556187e7d559cb8c2accb888a483be186697917de8937d3b3b50194fe54c44b5079619fc4b8d08c5da12fb84f91425a5930a97c1cc911b20852cc01e07bb325f0dd35c43d16e6bfe6acf2a111b836ed0cc0feba231e7aa927e63d487a5a42eef0fc7bf995d07fddcb27a4a30d620a4acbfaae4397b1db141f4ba747b7339eca73a5dbaea34996bebd222bd7c4b84e8390637fa7378ac2e4dc564c3646e8c5096596250dd56b6fc0f03e6682d88c56eeeb5d39330d7792bd75cfae88b91536421668da08766eb6218d8236463b70fc14c00bc11dbcf1229a9d8e3a1f08e87eaa94d76e6515efb77a0d216bfd0b6a2dd1353a674ed39892beeda8a0bb0b5b533ecb7f0c38b850d2fcac6754d5eafa2790ce614145aa5471733aa38d10ee1e8a8b33318a8bd6c4a59efaecd20f9e9c6f92a388380fe31bfdc922860c0ec4aa0eb559e666f81696c99daa0bdb8ce935f91ee06e48fe92441a0ab43e642963b6f3ce48365890e69ec1953eb318219c3a71feabfeb2079d761400689839a169d57ab3798e4e28d809fb123470c3d5a69fcfb995ba2e40d901334ef41cb95620debd4a4aee68978a4233d3ef64972b58101dfa9e3a0e90ff907e4d006ac1c771241e61a5fb52ae00c381d04977f598beb2ace0e203f5681e6264487f8f52f80e2207d0620898448715b800fd231d23e72db65af2ad18deeed21646cda5c831ac5d40ed514fa30aa3bddf1e239aeac66d87e25243c1d2701a2e137ddba2e328327f37caaa5e639b036778a20e365e9969754fa3983fb7cd2899ac1286016d27bf281efc01228731617d2d3cac5386d7ae1e717b852a15c96364c1c11a3c0ef601d76b1e6508ecb6543f0ceca77fb6ee71af988a37b14e272a1e62855a405816866075d2781d8e76b06df261b188508932ac3fd3f4230a6af1f9cbf364f082a44169b5c086cb8e6b57bfc119fbe6bdcb1e57cbba0b39a89bb604eb6bca2cad1185ab0f1ef70a2394716f7e4964b51dcf297b6eda6c443eea6fdbd7a12be0cfbcdc4d8d2086bda2a8a1a511116aab5717a05cb5a843d1bfdfdf49fa94673959640cac271be117baee3a4e9306852428a0be034c2c3a8a82b082467b44ddc22393eba3d9f8cb1dda58eed04fa0f001f92e993e8407c67b6c209c3602162038555781e82fe48b06a4cdacd013b943f20e6881dd09542678616ac9f42c0ad54d0e9222f14d4cfa9152de1a46517e287f01e9e03978297fa64e871ac5a237803490a50d0c2adbcbb23d24fbdfbd5d722c4ff6a2f5f3195ab01d7192be3724e7cd971523315189ba5b2b10f1bb97760f408d6bda3a78962edfca10bf71ba755860102172121603e063da8f2a779a2a1ed24e494c07a9ab0da901c11a857fd6d1ae5687a4a43ee868aa7d16f45aee0c11efb6764cac0712dab50e8ba9e4f4052e140187f66d96f086bc794a12132de9f90e64b1742aa6b555ffb8aa7eb89b937146eba9c4dc74e2178d3883740426b4ccd36ad2568894bc0cb075e8bb4318cf30530a0750a10ee6006ebff3364446ff394d5c4c854843128193e5939fb326e16f1c23bac5d2ba5aa3d9731518a9024fa5b0137c2a0553811ecd117cfc2db43d211b97446927f41287e34151fe8377b07ddece0a1a4cafc30b737f65cea7e2436edf43ff1ec1e2043bd1e17eeebfead3887e953523a4bce6b3d", 0x1000}, {&(0x7f0000001880)="5b37cb1a20e369f433558dd9f0b961e5fbc5e61f50f5e81c11aac5dc53e9b04ad8cfce46a76e8d4a9b1da11c89c2fc23f1cf7215f32279933d478331b63056f10b05e530c948407dff27c8dde5910664b7b0efffbdbef1fdfb217a23a3f483f4f0d7ee806a61fea5c83499dcf89943a19ecf1f0589f16151533b6e1365667985f5ba542a58c90472fd3a91b79af69279dcc64836a877aba54064952c7c03e8f3d30d8ae3892a168f8ac54342a4c822fd232c9ac0597bce1ce11fef4d5268a055b93ede011c953ff1ff40e1eaef925f04d4bceb44f1a4a3072fd2fca8df403dd97f099a7e8d3365fe", 0xe8}, {&(0x7f0000001980)="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", 0x1000}], 0x8, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x404c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1588.771932][ T4314] fuse: Bad value for 'fd' 11:34:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4068}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x406c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1588.975659][ T4341] cgroup1: Unknown subsys name 'perf_event' [ 1588.988562][ T4341] cgroup1: Unknown subsys name 'net_cls' 11:34:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1589.302197][ T4428] cgroup1: Unknown subsys name 'perf_event' [ 1589.310140][ T4428] cgroup1: Unknown subsys name 'net_cls' [ 1590.211346][ T4924] cgroup1: Unknown subsys name 'perf_event' [ 1590.220219][ T4924] cgroup1: Unknown subsys name 'net_cls' [ 1591.047830][ T5380] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) rt_sigpending(&(0x7f0000000240), 0x8) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1591.800445][ T5365] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = socket(0x21, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000180)=0x6b5502000ea0a93f, 0x4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000100)={0x4, 0x905b, 0x200, 0x7, 0x15, "949873569f1c274a"}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/diskstats\x00', 0x0, 0x0) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)={0x2, 0x4, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x2b, 0x0, 0x0, @in6={0xa, 0x4e23, 0x0, @loopback}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0xc9, 0xfe, 0xe0000001}, @sadb_address={0x5, 0x7, 0xff, 0x80, 0x0, @in6={0xa, 0x4e24, 0x7a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}]}, 0x70}}, 0x20000000) syz_open_dev$ttys(0xc, 0x2, 0x0) r7 = syz_open_pts(0xffffffffffffffff, 0xa4000) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000240)=0x3) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0xfffffffffffffffd) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b88c9cb9c6a750e951a065ac56e064896061bfbde7d8383f2dd3e827ac556fa058b85937ed2255dd20c541bcdc6c001d7905d4f825fd48461a0bdc91e6b33c4ab5ab728c5918cb845cbd0053506d0700ea6bc0e41fd6eed7aa640303e386e7d5ecadbb140de3e40c12af94f8d490a90e269b0bfb0aab2c3de3f8e122fba81f7a1f76b7c2c0", 0x85) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x407a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x409c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1593.102718][ T5626] cgroup1: Unknown subsys name 'perf_event' [ 1593.108885][ T5626] cgroup1: Unknown subsys name 'net_cls' [ 1593.318504][ T5687] cgroup1: Unknown subsys name 'perf_event' [ 1593.324744][ T5687] cgroup1: Unknown subsys name 'net_cls' 11:34:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x42440, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000600)=@req={0x1000, 0x175, 0x8, 0x2}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x40880, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfffffffffffffe2b) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="6ffe0000000000000023150020001c000180040001006e6400"/42], 0x30}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r7, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6f2b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_BEARER={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) fcntl$setpipe(r5, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r9, 0x4004743d, &(0x7f0000000280)=0x6) r10 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', r10, &(0x7f00000003c0)='./file0\x00', 0x2) 11:34:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1593.809289][ T5920] cgroup1: Unknown subsys name 'perf_event' [ 1593.815629][ T5920] cgroup1: Unknown subsys name 'net_cls' [ 1595.425725][ T6796] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ppoll(0x0, 0x0, 0x0, &(0x7f0000000400)={[0x7]}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r2, &(0x7f0000000380), 0x0}, 0xffffffffffffffa5) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000500)=ANY=[@ANYBLOB="4000003e78fe5ff1e79c9cda520ed989437e117c1516ecefcab5ac8887b8654a0799f9f6847d4d5090cfcda0f6fb79192de025602b19f4e2856a97262ad27f2fe45ddb64dbc6ff51bef6973d", @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) write$P9_RXATTRCREATE(r3, &(0x7f0000000100)={0x7, 0x21, 0x1}, 0x7) 11:34:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = getpgrp(r4) write$FUSE_LK(r3, &(0x7f0000000400)={0x28, 0x0, 0x1, {{0x81, 0x3, 0x0, r5}}}, 0x28) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000580), &(0x7f00000005c0)=0x14) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r6, 0x407, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, r10, 0x405, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r8, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r10, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24040000}, 0x40) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r11, 0x4004743d, &(0x7f0000000280)=0x6) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x1, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFTA_TABLE_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) 11:34:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1596.220612][ T6879] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x409e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:21 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) prlimit64(r0, 0x9, &(0x7f0000000280)={0x800007, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="43e8"]) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000100)) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @remote}}]}, 0x60}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a1}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a2}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:22 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = socket$inet6(0xa, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x144) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r8, 0x4004743d, &(0x7f0000000280)=0x6) [ 1597.626337][ T6925] cgroup1: Unknown subsys name 'perf_event' [ 1597.632770][ T6925] cgroup1: Unknown subsys name 'net_cls' [ 1597.923337][ T7043] cgroup1: Unknown subsys name 'perf_event' [ 1597.930194][ T7043] cgroup1: Unknown subsys name 'net_cls' [ 1598.087659][ T7123] cgroup1: Unknown subsys name 'perf_event' [ 1598.095891][ T7123] cgroup1: Unknown subsys name 'net_cls' [ 1599.907046][ T8160] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:25 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000e9d04afc99b6fc3d000000080700010000c005000500020000000a00000000000000ff0200000000000000000000000000011f00000000000000"], 0x70}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getnetconf={0x3c, 0x52, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x948}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x1ff}, @NETCONFA_FORWARDING={0x8, 0x2, 0x5}, @NETCONFA_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) openat$random(0xffffffffffffff9c, &(0x7f0000000700)='/dev/urandom\x00', 0x200440, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000240), &(0x7f00000003c0)=0x4) bind$inet6(r4, &(0x7f00000004c0)={0xa, 0x4e23, 0xc0, @loopback, 0x9}, 0x1c) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000340)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x8000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@mcast2, @in=@rand_addr=0x8, 0x4e24, 0x6, 0x4e23, 0x5, 0x2, 0xa0, 0x20, 0x16, 0x0, r8}, {0x3e18, 0x2, 0x8, 0x5, 0x1f, 0x2, 0x7f17, 0x7}, {0x4, 0x100, 0x40, 0xe7}, 0x6, 0x0, 0x2, 0x1, 0x2, 0x2}, {{@in=@broadcast, 0x4d2, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x3, 0x7, 0xbd, 0x7, 0x3ff}}, 0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f0000000740)={0x270}, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000400)="4b49687cad1a99fe2f30e869ac4ec19137005bb8d27b010bbf057cac", 0x1c, r0}, 0x68) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001000d65cc329bc7f62d8e9115fba26bd", @ANYRES32=0x0, @ANYBLOB="020000000000000008001b0000002000"], 0x28}}, 0x0) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f00000008c0)={0x3, &(0x7f0000000880)=[{0x5f3f, 0x7f, 0x1, 0xaf3}, {0xd6, 0x4, 0x8, 0x1}, {0x7f, 0x40, 0x8, 0x2}]}, 0x10) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x111800, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r11, 0x770a, 0x0) 11:34:25 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1600.624288][ T8146] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a3}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) getsockopt$sock_buf(r2, 0x1, 0x0, &(0x7f0000000180)=""/121, &(0x7f0000000100)=0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a4}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0xb, 0x4, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) getsockname$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0xff05) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, 'vxcan1\x00', {}, 0x100}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) r6 = socket$inet6(0xa, 0x1, 0x80) sendmmsg(r6, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x800) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r9, 0x407, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000240)={'hsr0\x00', {0x2, 0x3277, @multicast1}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="28000000080000000000000000000000000000002af53cbbe8a2944376b9d6f1eb3dd11dcab0ca5134f1c12198029a9542b60f629d5f68a5645c095982f710a7bacba0f5d061e90ad654d93b0000958a0287dbcd4ca79034ca8120807ddbf84d35b142f9db0221031071757cdf770a23a50d0c2c158f2915699c474eb8b0b747651e0b4beb945c3c00d8f7191248fc01304c64", @ANYRES32=0x0, @ANYBLOB="f8000000000000001feb2016f31afb49"], 0x28}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r13, 0x407, 0x0) write(r13, &(0x7f0000000340), 0x41395527) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r16, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r17, 0x407, 0x0) write(r17, &(0x7f0000000340), 0x41395527) r18 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r18, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) sendmsg$unix(r10, &(0x7f00000005c0)={&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000b80)="9250d76dfde1fab29cdb40b6ac4aa4091b9a48062cce71ea69b666538e410409793ed172e29b80877e003e9a9f27c99e4419342e9f2329085d6093d19c2bd27991e72bbe54127e7bd4dfacc89ef71e96584712551a8899cfd97f5af1a0d410786d5d7c963ef22ccaacb26e652715467d0fa8ce422897e63d9927f1da5c9a702a5592b32a6c3c40061113b2f6d9c57b7664101f04990a869e1b9cefbb951b995eefdb3b30dbbe1b8628db884cd4926ab4a66e75cc8a52fca4b798ec3d851c57174eaac7b7db7481ea808a9a04eb9ec897ef195bb17c21feb64a8a3f3645cd1f43613b30886ed07c12f5fdeda055abef4ed0af5d6d", 0xf4}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="2000000010000000000000ec00000000", @ANYRESOCT=r18, @ANYRES32=r11, @ANYRESHEX=r4, @ANYRES64=r15, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r5, @ANYRES16=r17, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r16, @ANYRES32=0xee01, @ANYBLOB='\x00\x00\x00\x00'], 0x83, 0x1}, 0x4000800) 11:34:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1602.097777][ T8226] cgroup1: Unknown subsys name 'perf_event' [ 1602.104760][ T8226] cgroup1: Unknown subsys name 'net_cls' [ 1602.112504][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=8227 comm=syz-executor.3 [ 1602.358631][ T8320] cgroup1: Unknown subsys name 'perf_event' [ 1602.365291][ T8320] cgroup1: Unknown subsys name 'net_cls' [ 1602.372005][ T8321] cgroup1: Unknown subsys name 'perf_event' [ 1602.378222][ T8321] cgroup1: Unknown subsys name 'net_cls' 11:34:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1604.500144][ T9469] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1605.233360][ T9469] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000340)=@req3={0x3f, 0x2, 0x65d4, 0x2, 0x0, 0x1, 0x9}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f0000000240)=""/51, &(0x7f0000000380)=0x33) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000040)=0x8001, 0x8) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a5}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000100)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000000000020001000000000000080700010000c005000500000000000a00000000000000ff0200000000000000000000004b3c18fc00000000000000"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xa1, 0x0) 11:34:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:31 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:34:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000003c0)={0x38, 0x5, 0x4a, 0x4, 0x1, 0x0, 0x4, 0x7c0c9227}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20013000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="20002cbd7000fc88000000000000000000000000000100000000000000004b5e69ea"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x400c001) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000000000020001000000000000080700010000c005000500000000000a00000000000000ff0200000000000000000000000000011f000000000000003f2f3eb780136801275a157a74a345fc758f7f9905c296ea59efc73e8df156fd8732f40a8de3f59596eaf2d6597509434d496aefa46d9573c5ebfa370ff6938f2f6ebe55c5f2eb2b9be6cc219af61e74e7a0b49b63fed44560077af37bd8a6cb08ca6ed2e88c51fc8e9795c8b83a289b476829315f489d119c67715720e06a09e383bdb8ff91bd1a00"/258], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1606.765241][ T9522] cgroup1: Unknown subsys name 'perf_event' [ 1606.771682][ T9522] cgroup1: Unknown subsys name 'net_cls' [ 1606.956513][ T9598] cgroup1: Unknown subsys name 'perf_event' [ 1606.962754][ T9598] cgroup1: Unknown subsys name 'net_cls' [ 1607.640052][ T9983] cgroup1: Unknown subsys name 'perf_event' [ 1607.648547][ T9983] cgroup1: Unknown subsys name 'net_cls' 11:34:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1609.321182][T10761] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a6}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)=0x80000000) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000340)="a44410e9681d7a17adbac1be7e117a110900fae7b9c862918ea797f34b1580bab9e059100895ff51fa490904d756fedd26064793c63beb59ba8586500cbe94c165585d71333ddeb03fe88b5170d9135577e7d7f49eb1bd0848407d5195b8d2234b1f751fa9818f012d6a45be5e6d328d43c530de8989ac1d371b53dd915427c08dd124c6b02563c93932e0359be5e6acd3b2abffa1f7b87f57426baac54527a7e4136fc89450a221524c0f54f2e72c75a5ab59ab6e8af99a48af5c341e6dad45038d9e4e457358171b", 0xc9}], 0x1, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x40a7}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xffff8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1610.083061][T10759] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600010000000a0000000000000000000000000000000000ffff000000000000000000000000020001000000000000080700010000c005000500000200000a00000000000000ff0200000000000000000000000000011f00000000000000"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x4000000000000000) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r5, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xa, 0x0, 0x0, 0x25dfdbfe, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}]}, 0x50}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x4) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1610.927052][T10810] cgroup1: Unknown subsys name 'perf_event' [ 1610.933178][T10810] cgroup1: Unknown subsys name 'net_cls' [ 1611.241224][T10936] cgroup1: Unknown subsys name 'perf_event' [ 1611.247451][T10936] cgroup1: Unknown subsys name 'net_cls' [ 1611.531852][T11090] cgroup1: Unknown subsys name 'perf_event' [ 1611.538114][T11090] cgroup1: Unknown subsys name 'net_cls' 11:34:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1613.617228][T12055] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xffffa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x4c01) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x3) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x22, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) sendmsg$unix(r5, &(0x7f0000003840)={&(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000037c0)=[{&(0x7f0000000580)="75b5368b2ae6270e8d3215a8cc19410876b50dca976c78defe6b715471953ad9fc5daf05ff1c2b167a9095db3f1f1cb25d69f05bf47eee56d58319cf2cf7e3ab9e3992572eae7ea1a7c455ef0cc56c8b025ae5e03a8aabfe1e86b9fc0e", 0x5d}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="78741f7d56b5ecc54782ea1f70a2ebbd4f73320fd5f2f04d53fe4bab337999cb3002403a194fa6c724f37bd8ad35041cdb56334f9fb0edaf7f6807fc90e6454e871f9ba91564b72ed90610c1114569fc02cdc3d9c5cfe9303d1dfd956d7c759add6162723e940797e7fbbccda15f76b41922d370a78af3d212d1eead5b97865f8afe5cc1797a048c924d9ecaa2172df3d81c0891e900b903d2896d2952c96eaacbc3f853c1a9cf482871b871aefbaebbe7dc8068b681d7a7624e0e", 0xbb}, {&(0x7f00000026c0)="68bff293c55e2a7cf80e063017efcff7fee753d43cf478de173d837d3a7ce0f5dd0c9ffbe774ace7fadab084e315d98d33bb7f048a18b9c4e2e148b0f7dca7859c149d1c382384bcd108db9eca712200d1a27e50477fda47fbe583e24e3f62ea2393a5cdac9502a4833e72867b297cfcc05c88e4a2397f299fad8de54b4816ab873ff65cbcfc008eb91c0abe57728870db51437710dc38095c8a49f4f7002a30c4305d035f9dd4d1db08fcb4d1d2bea08dfdcabf5feea9cb67e94be19390a8214c18838c1e78fa89d18d2bd665178f22aad9fdc7c85e3fac955d8bd7ec1cea6b1b427fcc2524fa", 0xe7}, {&(0x7f0000000240)="54e855df45d8e9dff45bdf2bc62c7fb85de782256fc9a02bc271f8b60094db8b5d7ffde758f8b6298eadc34aee3f743a89c2e13e", 0x34}, {&(0x7f00000027c0)="810ab910e62d28ff940df09d8e9ca8f12620403ad3f925a91a9066b10bcc3ecdd2e5fed569a70d169ee19b931f37a2f3cad9a96bfa45324e67fabe902174ea51c8e1fa35f266ff0b4f5a020d40e5b42aa948a0263b3532db2cd1dfe00140ca8bf4e7d37039a97ee0f7ec57d7e78fc4eca83611d1587dc5ebc281ebc56bf25a2c54c563f4679224cfa30d331367a316ee14a39012348fc51f2e06475f054b576cbe000bf9783e4f928bddc7b941c5ad3e286eb7dcbe29e73950f632d3f5fed57032f99871dec2f7db6f649b99fd6153681d0f43a5eaf3e3c5d451527ec35cbb73c74056ce1ebfcec366b41ab52384e67db94d95e29f41f467ed5d4b2d587ede574127eb6f3cc4f2cb0687288c835500dea09d134bfae6e72bd11e7a1aef580a52bdea1994fb7cc96dd18c49d75f067bfab5ae65668beb7fb578ecef8e52079f62e65d9f0795763e41559711ae601872d1a59c1eeeaed17e3d8fcc947eed36c3c1c9a42f14d3232f0c8bb0b5f4ba8f74860af871ec2afe8b6028a8e3347e6c2cd989c46e3555154ecdc7604b5ce76bc4fcaaa40de3cfaf8d0a52855c737652c7a993e24f2614d9130392b58171dc020cb4f5a2a34579a2ddfc20702810d0ec4dec34852bb3dc4de204430f4ea45c66da26b4a90a74a9e71f8124635b9cc32e2683c5206fe07abccfebc18923243c64e9b93e869f4477e927b80f4848aa5d45d0fe01466c0edc28128193c4c263bd7b29b85408f049aee95a5056de744476ef71425d6dc237458f7e1b7fba745a5fc841e94619ca455b28fc82cbb90f6e4728a6a6bc27a61b6720c60a12f8ead7e74abdc8f09421e9f5d5eb78ca177950824be1f4dc5eac051cd6d1124b7f69231a9528eae20adf030ef8cc4a9df161c0c1f95d466b09cddb9338142a41c43c036b2160f6b2322f697a8863b6c785f16cd1d1bc8cdea5da004acfbbdc6454929d582b7c70f134088b5b47b540d4719683b2a68e009cc913dceef882d5e87748109f95d9f52346568330a138a5852fd5b997b6922eec189d7206ceb7c28f5877c23fd91c3a275533a4703fdbfef209e8287094d1a7b949801883c77cb295d602896f0b84f96db8222b38c4626378c598b86192eb5bb2ed79ce0ca5c4c9b4f27771a6c9588f52a113ad2b2854526cd13937b61b3b082a9de7e8042aeb6237e56e33f22da560f45209465d5b88b4685e264356c6a2fff0db045eaee8a0f200f2a3fda682298192f0a9a7eb0301a331c699597b25e8e5d4fc9edb80d7659ed6e6c9c1c73df312f5d07059c713ed8d1731538e0a0a834654513ac5dfb8c9b84ed934518544a36228fd9388d2c80c4aa9f9d380d31bec46152149dbae8a5441f08a655012262c98f80db53edb7a58ab7dccabc77ccb6e63ba927bac987f6fff06d18cbc245bb33cd2fafc6d2194d90a48ebcbed150783b01c777c487d83426db4747bc52a7c49c64a5c8efabb60c49c23bee7d276bcf7b97e986bff781ac9a673c66af41e3bb9a004bc6223b62b27e82d0f8f3ba0cc4d1db0c2818d69fb1416db8ff5769ba0d4798fcae25fd22be2fbab7f8fcc78c32ca7a66160e66f70dd1b782ac1e3be7f7ef707e124b2470938f7d074371aec17c587ef5528ef366a1e805da520f921bd0f2eff9f41fa037c5a3158e55410e96ee3b0399cecd7798d1e008601093ad9c8d374da763b309acb3194d0c729b69c663880c0d402b05ea3db58c9131ced15fb05cf51f52457d47bd4f133524b264a6f6d98a2c6e94976efa49a6fb9d016e9dcc22096eafbf535fc363785f83e5d8ee1e791e1acfa463cdc713d5fdb882319917775e52402d78f33c417de4af72d6cb87ce58f5e397df23d35ad146bce86674fb21bffd51c9ca1b1c04ed5487f01abb16aa6b9a22e69f26eeeb640a5d2ce15bc067473e366f1cd44f9061fc4b8660b6c488dc310e365274ede77d2ad09ffd7fdbd9a5fc98c98aad1d355e011e22276aada31e481b031580bd3edea48e6dde444a61828020253178abc8b5297ddd7145dc539cbe7884624efdf9116c618463e8fced80242e249330141865eac445f007bc7c34fded5e9183bbd328774c4d039c6e7cb706a7ceeb360460d1e636d9813fee1daccf0d0a42f3a1aabd8fc1312633d816368121fb05c637dbccbc248da216c231772d0afdbaefeb58411b949c3a132430f8f7535cc0f49261a36325b5b3f06d88c962e00b161e474b4a1449b0954995175f3449c14f74ae8b379c0334a52d5b26cad7a82b51c10b1c7206204a35c5eee3ca0b50f50fdcb7836a10c92e7d6986d22ecef2be4750fb2ad7a9b89e3e2543392ea520a9ec6ebeb0136b97f7fbccfb63b33cbc804b37477471c4a05015e2f4bdeee46a5675c7ff400fd798486aa326256daaa8f6c4e2ca0981b480d7977e8d75503ae465b7206ea8a11a692910a6b367539632851b9111dbab01f9003de7f73cfa474911cf251328ea7be8eb1e7fe4ed720985ab258d2e1a4b23f5c8e55222ce07a0dead421896b72912c0dfc8147eebaff54ea993d7a6403bdd5fc21a3f4e1fd8dad004aa7e092854c3a70e629dab204e491269470eaa1f02e5320715745d52981bb85d52d36d6a706ec6be578c231f43cdc8e12049ce4586d49d71c2714f64856a96fb7b1524836bf5ebf938443f0d0e99bfc4c2c6f09d7122930ab794d0d5247efc7bb17392790f871c8f59c5f3ac2f024cffddbfc98ff6d043fe7cf6eeab5114f6769b574c24c8f9b4cb1b2c8d604811daf97d54a3635a5d0489943b0a6d63a409c5db14832c05dd3ae18e6c0769a66e6136da9517ebc371aa56a8ec705953ec5fcd3228d67fecb934206adb9b0575154a5ea28c53e1cd78e9c73f68e1677d923ec723d155d333b8f1671ec1b5bf8c702540ec4001b8238aa734b8c5020f0fde29e1e9b7f00c2b00234fd9c6bb830dc62971985641219f9100ba9ad11a5226f607fd9f4b7f7c0539beb336f381fa1195260b50f47e2aea41affcf23f92599075c8cea768158b01ab524f8894a2b691906841eb666d759f0082161c5c8527f451f680b965389400a6e856fb151daa48048a0299f8ceec8d5947a1d8eeed42d078c38c748c4af12bfa04f91bd82db982f9304847a673be2ae943ea80fa00576ba906dad624d80d74138b71e32b1d393c66625116c63f6ad5be6b7916c195260ec7185d9599452b475b79a623a4403386006cab0489ad48348d194a036f8989e9ef6bb01691dc63c955b1446a559e5f121698f3b9eddad787c48088e59c3715fa70e5dc715ae8b2c28cb3b7eb6c2c559542633572fb83ab1e24005137c0f3b5ca56e7f8a6ab8f2bad888c2f2a7fce8c5bbc913d7acd55baaffb02a41559c1999af0427813e7bb973dab117811611b424eef1f5ca65da85168517d6c8ed6a48b91719512bfe48ec239460ef4b3b77cc37106bb3d8f63743b8932ae0ddb4877b5b5f061dcd5f7634f5b54079f3dfbfe2100a969f3d642c1c1c5c96bc76a6b3ca31419f4bb5d7c29efa416e27c3ecff70ee11b6dd9a1c6c25930171e4316b3f031b828d213d4b94f4ee1f24dc53f0a7dc4384bc6e60d6f194c0b9b49e69d024f91488c87080240ae6641e958246680cfd19bb4d8e914ba0526c0cdef558f64c2f1f32bec64083d19d0b4c2a61ee4ed05ed746ba7b0718946bc246ce36ca45bc57041f50fa56e597b605442447b2cc2d678cb14a58a850a9d4ca4874fcb881be73c1e8a73b50ed0909973a1621165cb195e19c0413eb825afdf21d4efca3d13702b1068c0f904a669c3618ba147333a59b251cae32d6901162e6349f0a9c5ce09a3b979045a78feef897537f5d5016d42994aec0bc2d154224d80fb50f9ded0459e96c968115bfbddd36d1808f45c1d21de438c6bd011cae1b8e0363cfed8b3e7fb60d7ac173eda6ac2f0187e1968345e4846422b6c1c93a5dc9829a416b41c4d4e4d0bd84b6258503546008465bebacbc29a88c4deae75fed95f95d3d91e76d83b7aa29fbf1dfcc7794a4c4fc2709cadff58557cf33a3797ef9f103bbce08a1304b48cb94d49c6b48e079e030700f48f5b80be90042f0b91affd7d8c47dab64cb05836d4cc2c517e56a255dbaa11166b0952b78e2d92d9a8285e042a47bdacd113ceffacb28990d8625be59ccb365979057d83ae43f4984177e761dcd91826e0240939c399d8f83cb3a6ef692b19944a65505aa68f17deb98f7477dc0b3ec2f6dd998d542fba8cfb5ff89263626aea12948db6261e6ef44d3634ea8487db0098c34fd89f2bc4a09d2afeff2ae0b6457769022c152b7ab315e3f5ae164961dfea1448b82f01637fd2f1209fc8d202b24d5de7a6ffae8e341a25feb1d7fec0fb6ddfec8f44224ac855a2f0420202991575c956d87c3175d045f790688f568670ce56183a7941bc798689d1dce57ac75e4e4b507b72c6ac6302b0195184a0195095d7d817b6a254dd71e3994591f2c8aa87e875312fe98621783f2481bb5b1ed4186e253f1b866abcba5ceb04131f34b38a557f76b01e4bc04d0ccf4f4231270bd9bb0a7d290c9d7008a5ca3bed09abeeafbb38bec448a46644d14ae6aae13700d068ffc40fb55fb8683d20d69941d64821109ddacc1c555a5c1d34d86ca085db15330d4ebf3ab4d8c7aeb1d621b7c224b2ea8e3306083ceacef064ef98f0aecfe930d206868e2a5a3c8b2bfb7317a6a4793500447af05585bd53fc819997a24850e4275fc84b9a5c17874e07a6340bf2c9a16c486f55fd3c7145d92d30dab68110e6a0f2efbb1bd09346101e71f79ae4b914a8439695e562461ea385f3a987049c9b4738c6e51f0ca858c0adc7336ad52320509ce6551853a6d1796d2eb069a0d5f28b04e03de64daac27b64542be7bcd370c3a23245cdf2ac597d26c0f3a947c84ee238b409e4f05e54aad2465325a6575a69aa8148183f2ff6135673b7bff8af07f21d7af09a12ccf7371680cbf7a20a23107df1a29f07d0c6315b2e46feb75be0003a9d45bd2dbcb802c1a3a2fa0ee082b6ab92b3c30650bf109ebf49eeb248bc2441cceef069ae65efce0ab294f925498b88859e6ce3e9b1030806b1eaad7202c26474258d40d5b5f66ff3f471c4ecde9a4d7e373fe7924c61c29f714494b61989fb7423f68a576045040df7203dea1302b61e6a6e21c498e42657d3d77508f1ccc744fa05c85376be6c57f65bd462844236d745293922970aa89c883ec8b50fbf94cf312d7df697138b7fb7d5ef6a2ccb0746561e3c454b2b0acada9cb612ebab4ce3fecf447c7e3662918851f79328ca550f607ce7a067b62f725fa3bb8e2f72204ce6158a12b94bb5494c5237d124391206f1221241e188e261afa010103f622c045c5f5964cbda547a530a790cdb66c058d9160a3a7c0754f2caaec3b9eb0fdfb83023dbac1aeafd986b288e6d817af89a7145354ae94c9abf41c36552251d8b3dd556d5111a879c49dcfa0bbe1fed8e70c97fe96e0a9e630089df9707ea2d5978230007965422937a61a5f78f344c9ff3a11eb57acc5fee04acb7196ecc19894448b4aabce084674e0e7840ba094647b7aa8fc32c5ff847f40a4ebcb889e40a8271a130b060aeb0dc987af87a11581efabc6d9eb3dfc454662648f6c61b1fbab25236b1725559acf265bf55cabb3f41d2d95105532ff42a1c289cfe82ea51813a1e6d154061157d62ed34c6dbeecc58855539cc5b9c266a75b2ed283a6c29295fed4eccd4cd55dd1e495c7380d3d1a471c25efba2e1f29b5813aac2b7ef141aca3dc9645ed55e4da82871062e238", 0x1000}], 0x7, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [r6, r3, r7]}}, @rights={{0x20, 0x1, 0x1, [r2, r8, r9, r10]}}], 0x40, 0x8000}, 0x800) inotify_init() mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r11}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r11, 0x0, 0x0, 0x80800) lookup_dcookie(0x4000000000000000, &(0x7f0000000480)=""/122, 0xfffffffffffffeb9) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000003880)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a000000000000000000000c000000000000ffff000000000000000000000000020001000000000000080700010000c005000500000000000a00000000000000ff0200000000000000000000000000011f00000000000000"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200000, 0x0) getsockopt$inet_mreqsrc(r12, 0x0, 0x25, &(0x7f0000000180)={@dev, @local, @dev}, &(0x7f00000001c0)=0xc) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1614.397016][T12054] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x4, 0x3, 0x0, 0x10000}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000480)={r6, r7, r9}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPKT(r10, 0x80045438, &(0x7f0000000100)) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xffff8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x19) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1615.338665][T12101] cgroup1: Unknown subsys name 'perf_event' [ 1615.344924][T12101] cgroup1: Unknown subsys name 'net_cls' 11:34:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1615.695650][T12237] cgroup1: Unknown subsys name 'perf_event' [ 1615.701973][T12237] cgroup1: Unknown subsys name 'net_cls' [ 1615.924008][T12309] cgroup1: Unknown subsys name 'perf_event' [ 1615.941794][T12309] cgroup1: Unknown subsys name 'net_cls' 11:34:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1617.237481][T13013] cgroup1: Unknown subsys name 'perf_event' [ 1617.243884][T13013] cgroup1: Unknown subsys name 'net_cls' [ 1618.093785][T13452] fuse: Bad value for 'rootmode' 11:34:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r6) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000280)=0x6) [ 1618.520399][T13597] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value 11:34:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x22}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa1, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) [ 1618.844849][T13711] fuse: Bad value for 'rootmode' 11:34:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x25}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x89a2, &(0x7f00000001c0)={'nr0\x00', @ifru_settings={0x8, 0x81, @raw_hdlc=&(0x7f0000000180)={0x200, 0x2}}}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCMBIC(r5, 0x5417, &(0x7f0000000100)=0x51) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000480)={0x2, 0x400000000000003, 0x0, 0x6, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_x_policy={0x8, 0x12, 0x4, 0x1, 0x0, 0x0, 0x4, {0x6, 0x2b, 0x5, 0x2, 0x0, 0x7fffffff, 0x0, @in6=@empty, @in6=@local}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x1f}}]}, 0xa0}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x8, 0x7, 0x0, 0xc0000001}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1f}}]}, 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r4, 0x0, 0x0, 0x80800) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x3000000, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000000000000000000005000600000000000a000000000000000000000000001e050000ffff000000000000000000000000020001003f00000000084c00010000c005000500000000000a00000000000000ff02001800000000000000000001dd0a0000000000000000"], 0x70}}, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) 11:34:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10001, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) sendmmsg(r5, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x16, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@isdn={0x22, 0x1, 0x2, 0x8, 0x7}, 0x80, 0x0, 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) unshare(0x20060100) keyctl$clear(0x7, r4) keyctl$get_security(0x11, r4, &(0x7f0000000340)=""/75, 0x4b) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) 11:34:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) unshare(0x20060100) keyctl$clear(0x7, r4) keyctl$get_security(0x11, r4, &(0x7f0000000340)=""/75, 0x4b) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) 11:34:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) unshare(0x20060100) keyctl$clear(0x7, r4) keyctl$get_security(0x11, r4, &(0x7f0000000340)=""/75, 0x4b) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000280)=0x6) [ 1620.277215][T13787] cgroup1: Unknown subsys name 'perf_event' [ 1620.283414][T13787] cgroup1: Unknown subsys name 'net_cls' 11:34:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)={0x2, '\x00', {0x2}, 0x1}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x501000, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000480)={0x0, @remote, @broadcast}, &(0x7f00000004c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff}) getpeername$packet(r9, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005100)={0x0}, &(0x7f0000005140)=0xc) r13 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r13, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r14 = socket(0x11, 0x800000003, 0x0) bind(r14, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r14, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r13, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r16, 0x407, 0x0) write(r16, &(0x7f0000000340), 0x41395527) getsockopt$inet_mreqn(r16, 0x0, 0x24, &(0x7f0000005740)={@local, @initdev, 0x0}, &(0x7f0000005780)=0xc) r18 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r18, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r19 = socket(0x11, 0x800000003, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r18, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r20, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005c00)={0x0, @remote, @remote}, &(0x7f0000005c40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000007b00)={@dev, @multicast2, 0x0}, &(0x7f0000007b40)=0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000007b80)={0x0, @loopback, @multicast1}, &(0x7f0000007bc0)=0xc) r24 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r24, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r25, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r24, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r26, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) r27 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r27, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r28 = socket(0x11, 0x800000003, 0x0) bind(r28, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r28, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r27, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r29, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) r30 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r30, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r31 = socket(0x11, 0x800000003, 0x0) bind(r31, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r31, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r30, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r32, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) r33 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r33, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r34 = socket(0x11, 0x800000003, 0x0) bind(r34, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r34, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r33, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r35, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) r36 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r36, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r36, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r38, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r16, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@initdev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f000000aac0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f000000aa80)={&(0x7f0000009f00)={0xb50, r6, 0x8, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r8}, {0x1ec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x244, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x0, 0x4, 0x1f, 0x87a1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xf800, 0x8, 0x71, 0x8}, {0x85, 0x80, 0x8, 0x7}]}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0xdcf, 0x4, 0x5, 0xff}, {0x0, 0xb, 0x80, 0x4}, {0x7, 0x7f, 0x2, 0x6}, {0x20, 0x3f, 0x3, 0x40}, {0x9, 0x20, 0xf5, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x5429}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffffe1}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r21}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r22}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r29}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x7, 0x0, 0x0, 0x10000}, {0x2, 0x0, 0x4, 0xffff6ff2}, {0x1000, 0x80, 0x20, 0x3}, {0x4, 0x2, 0xff, 0x8}, {0x200, 0x8, 0x6, 0x7}, {0x3, 0xcf, 0x1, 0x3}, {0xffbe, 0x9, 0x7, 0x400}]}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r35}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x20, 0xb, 0x2}, {0x4, 0x4, 0x8, 0xc3}, {0x3b7, 0x0, 0x5, 0x550}]}}}]}}, {{0x8, 0x1, r2}, {0x1bc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r38}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r39}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}]}}]}, 0xb50}, 0x1, 0x0, 0x0, 0x80}, 0xc090) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000a40), 0x5a1}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r40, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCATTACH(r40, 0x4004743d, &(0x7f0000000280)=0x6) [ 1620.593185][T13898] cgroup1: Unknown subsys name 'perf_event' [ 1620.599683][T13898] cgroup1: Unknown subsys name 'net_cls' 11:34:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1620.788408][T13990] cgroup1: Unknown subsys name 'perf_event' [ 1620.795211][T13990] cgroup1: Unknown subsys name 'net_cls' [ 1621.320914][T14271] cgroup1: Unknown subsys name 'perf_event' [ 1621.333809][T14271] cgroup1: Unknown subsys name 'net_cls' [ 1623.213231][T15311] fuse: Unknown parameter 'user_id%00000000000000000000' 11:34:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lookup_dcookie(0x0, &(0x7f0000000600)=""/121, 0x79) [ 1623.558645][T15425] kasan: CONFIG_KASAN_INLINE enabled [ 1623.558694][T15422] EXT4-fs (sda1): Unrecognized mount option "fd=0x0000000000000006" or missing value [ 1623.564040][T15425] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1623.581795][T15425] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1623.588730][T15425] CPU: 0 PID: 15425 Comm: modprobe Not tainted 5.4.17-syzkaller-00002-g202bb0151929 #0 [ 1623.598344][T15425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.608407][T15425] RIP: 0010:path_openat+0x324/0x3c00 [ 1623.613685][T15425] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1623.633304][T15425] RSP: 0018:ffff8881a60b7920 EFLAGS: 00010247 [ 1623.639375][T15425] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881a60b7b48 [ 1623.647355][T15425] RDX: ffff8881d13bf018 RSI: 0000000000000000 RDI: 0000000000000004 [ 1623.655319][T15425] RBP: ffff8881a60b7bf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 1623.663271][T15425] R10: ffffed1034c16ed7 R11: 0000000000000004 R12: ffff8881a60b7c48 [ 1623.671218][T15425] R13: ffff888199c85700 R14: ffff8881a60b7e40 R15: dffffc0000000000 [ 1623.679225][T15425] FS: 0000000000000000(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1623.688283][T15425] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1623.694859][T15425] CR2: 00007ffcec876dd4 CR3: 00000001a465d006 CR4: 00000000001606f0 [ 1623.702827][T15425] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1623.710776][T15425] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1623.718828][T15425] Call Trace: [ 1623.722100][T15425] ? do_filp_open+0x430/0x430 [ 1623.726762][T15425] ? getname_flags+0xba/0x640 [ 1623.731520][T15425] ? getname+0x19/0x20 [ 1623.735571][T15425] ? do_sys_open+0x32a/0x7a0 [ 1623.740176][T15425] ? __x64_sys_open+0x87/0x90 [ 1623.744841][T15425] ? do_syscall_64+0xc0/0x100 [ 1623.749505][T15425] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1623.755561][T15425] ? get_mem_cgroup_from_mm+0x2b2/0x330 [ 1623.761089][T15425] ? mem_cgroup_from_task+0x60/0x60 [ 1623.766265][T15425] ? __kasan_check_read+0x11/0x20 [ 1623.771377][T15425] ? __lru_cache_add+0x1ae/0x200 [ 1623.776292][T15425] ? expand_files+0xd1/0x970 [ 1623.780983][T15425] do_filp_open+0x1f7/0x430 [ 1623.785465][T15425] ? vfs_tmpfile+0x230/0x230 [ 1623.790081][T15425] ? __kasan_check_read+0x11/0x20 [ 1623.795083][T15425] ? __check_object_size+0x309/0x3d0 [ 1623.800349][T15425] ? _raw_spin_unlock+0x9/0x20 [ 1623.805093][T15425] ? get_unused_fd_flags+0x97/0xb0 [ 1623.810194][T15425] do_sys_open+0x36f/0x7a0 [ 1623.814593][T15425] ? file_open_root+0x440/0x440 [ 1623.819485][T15425] ? __kasan_check_read+0x11/0x20 [ 1623.824502][T15425] ? do_user_addr_fault+0x6b7/0xb50 [ 1623.829797][T15425] __x64_sys_open+0x87/0x90 [ 1623.834289][T15425] do_syscall_64+0xc0/0x100 [ 1623.838778][T15425] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1623.844648][T15425] RIP: 0033:0x7fef68e111a7 [ 1623.849043][T15425] Code: c3 66 90 c7 05 fa af 20 00 16 00 00 00 b8 ff ff ff ff c3 f7 d8 89 05 ec af 20 00 83 c8 ff c3 90 90 90 90 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d cd af 20 00 31 d2 48 29 c2 89 [ 1623.870046][T15425] RSP: 002b:00007ffcec876c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1623.878464][T15425] RAX: ffffffffffffffda RBX: 00005644a24915c1 RCX: 00007fef68e111a7 [ 1623.886437][T15425] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00007fef68e15282 [ 1623.894401][T15425] RBP: 0000000000000001 R08: 00007fef6901c570 R09: 0000000000000000 [ 1623.902356][T15425] R10: ffffffffffffffb0 R11: 0000000000000246 R12: 00007fef6901c090 [ 1623.910306][T15425] R13: 00007fef6901b040 R14: 0000000000000000 R15: 00007fef6901c570 [ 1623.918287][T15425] Modules linked in: [ 1623.922898][T15425] ---[ end trace d56220e164ee9655 ]--- [ 1623.928591][T15425] RIP: 0010:path_openat+0x324/0x3c00 [ 1623.934012][T15425] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1623.953756][T15425] RSP: 0018:ffff8881a60b7920 EFLAGS: 00010247 [ 1623.959904][T15425] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881a60b7b48 [ 1623.967928][T15425] RDX: ffff8881d13bf018 RSI: 0000000000000000 RDI: 0000000000000004 [ 1623.975928][T15425] RBP: ffff8881a60b7bf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 1623.983968][T15425] R10: ffffed1034c16ed7 R11: 0000000000000004 R12: ffff8881a60b7c48 [ 1623.991982][T15425] R13: ffff888199c85700 R14: ffff8881a60b7e40 R15: dffffc0000000000 [ 1624.000010][T15425] FS: 0000000000000000(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1624.008989][T15425] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1624.015694][T15425] CR2: 00007ffcec876dd4 CR3: 00000001a465d006 CR4: 00000000001606f0 [ 1624.020493][T15428] fuse: Unknown parameter 'user_id%00000000000000000000' [ 1624.031158][T15425] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1624.039480][T15425] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1624.047498][T15425] Kernel panic - not syncing: Fatal exception [ 1624.054401][T15425] Kernel Offset: disabled [ 1624.058722][T15425] Rebooting in 86400 seconds..