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"}) [ 166.035396][T11663] FAULT_INJECTION: forcing a failure. [ 166.035396][T11663] name failslab, interval 1, probability 0, space 0, times 0 [ 166.109414][T11663] CPU: 1 PID: 11663 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 166.117771][T11663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.118462][T11670] fuse: Unknown parameter 'fP0x0000000000000003' [ 166.128014][T11663] Call Trace: [ 166.128036][T11663] dump_stack+0x116/0x15d [ 166.128048][T11663] should_fail+0x231/0x240 [ 166.128061][T11663] __should_failslab+0x81/0x90 [ 166.128072][T11663] should_failslab+0x5/0x20 [ 166.128083][T11663] slab_pre_alloc_hook+0x20/0xb0 [ 166.128105][T11663] kmem_cache_alloc+0x4d/0x280 [ 166.169112][T11663] ? security_inode_alloc+0x2e/0x170 [ 166.174745][T11663] ? should_failslab+0x5/0x20 [ 166.179892][T11663] ? shmem_match+0xa0/0xa0 [ 166.184611][T11663] security_inode_alloc+0x2e/0x170 [ 166.189734][T11663] inode_init_always+0x211/0x430 [ 166.196928][T11663] ? shmem_match+0xa0/0xa0 [ 166.202495][T11663] new_inode_pseudo+0x6f/0x1a0 [ 166.207433][T11663] new_inode+0x21/0x100 [ 166.211587][T11663] shmem_get_inode+0xa1/0x430 [ 166.216709][T11663] __shmem_file_setup+0xef/0x1c0 [ 166.221654][T11663] shmem_file_setup+0x37/0x40 [ 166.226329][T11663] __se_sys_memfd_create+0x1eb/0x360 [ 166.232144][T11663] __x64_sys_memfd_create+0x2d/0x40 [ 166.237450][T11663] do_syscall_64+0x39/0x80 [ 166.242343][T11663] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.248277][T11663] RIP: 0033:0x45de59 [ 166.252548][T11663] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.273386][T11663] RSP: 002b:00007f4c771afa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 166.284636][T11663] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de59 [ 166.292631][T11663] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 166.300629][T11663] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 20:07:10 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000477a740871042c012cad000008010902120001000000000904"], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 20:07:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000001000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff0000000076040000000000007e400500000000004704000001ed00007b030000000000001d440000000000007a0a00fe00ffffffdb03000000000000b5000000000000009500000000000000023bc065b78111c6dfa041b63af4a3912480000000a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1a0d7d600c095199fe7ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc640500798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9002f2460d0b11008e59ae623906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f56d7cec33ca910bfd9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d64b64f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478340002d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242e20dc2d9b0c35608d402ccdd9069bd50b994fda7e9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6ed5a40213cbf8ed7f00000000000000fe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da8a888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb118c883ad2a3b1832371fe5bc621426d1ed0a4a997577a45e2a0aa9cff8cbaf32cfdce1a02cc1b69129135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc6cd030511d00000000c95265c6c41c394c6261a493f1950f76ba37b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244172cf404c5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff2f0c9f92a94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554b0100010000000000954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fe0400000019fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69239927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e96735600000000000000000554f327a353511cc07de99493c31ac05a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe47f5b119ef240300000009bc90addb7b9aee813df534aa3553c4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18e4e3ccb8cdf49b7c58a4bb67cde98d662eee07cc8c3ec61d4cf0b7317024094eed0de9d78ac5ed9965d5ab3b56d4ae02faa36693dd7b74a64bd85c9cf3f9bd8547b02198dbb1a2050a1dfa7d947d397cef3d6f3f896eda25f9fa054ae61594f17c5f448a0f6adae66e4ff18c4bf7f4e4bc725d9ebc541759f4544e102bca2c8c936296c9f4a02e8329ee76e5868eefd58fc3153239c96edd827596fb78b02c3b1516ecc8771ac3cf3effc77a3fd42d508a328ed5cdc7e10c0670e9a4456f1bf0826a7abf4d916155ffac627db818beaa36088954c736ebc3b86343d100004d428b8fb6f96cd995fe03943f00bf75080d16002e00dcc641c9c39753eec3b5281850a313f3aedd487d7ea5d6bf347fbcafb7a0ed815ecb63e3"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x16, 0x10, &(0x7f0000000040), 0xfffffffffffffd00}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x1, 0x4], 0x2, 0x80000, 0x0}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000100)={r0}) [ 166.308615][T11663] R10: 00007f4c771afadc R11: 0000000000000246 R12: 0000000000000000 [ 166.316646][T11663] R13: 0000000020000080 R14: 0000000020001380 R15: 0000000020001440 20:07:10 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfe, 0x680140) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000000180)={{r0}, 0x6, &(0x7f0000000140)=[0x3f, 0x2, 0x6c, 0x9, 0x7, 0x0], 0x5ec, 0x0, [0x4, 0x5, 0xfffffffffffffffe, 0x99e7]}) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000580)) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_OPERSTATE={0x5, 0x3, 0x2f}]}, 0x3c}}, 0x0) 20:07:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x16, 0x10, &(0x7f0000000040), 0xfffffffffffffd00}, 0x48) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x1, 0x4], 0x2, 0x80000, 0x0}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000100)={r0}) [ 166.382649][T11674] fuse: Unknown parameter 'fP0x0000000000000003' 20:07:10 executing program 4: syz_usb_connect$cdc_ecm(0x6, 0x59, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0xff, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x47, 0x1, 0x1, 0x40, 0x0, 0x2, [{{0x9, 0x4, 0x0, 0x8, 0x3, 0x2, 0x6, 0x0, 0xff, {{0x8, 0x24, 0x6, 0x0, 0x0, "b50f49"}, {0x5, 0x24, 0x0, 0x8000}, {0xd, 0x24, 0xf, 0x1, 0x7fff, 0x8000, 0x8cd6, 0xaa}}, {[{{0x9, 0x5, 0x81, 0x3, 0x200, 0x81, 0x9d, 0x7}}], {{0x9, 0x5, 0x82, 0x2, 0x8, 0x2, 0x5, 0x84}}, {{0x9, 0x5, 0x3, 0x2, 0x7df, 0x91, 0xfe, 0x7f}}}}}]}}]}}, &(0x7f00000003c0)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x310, 0x79, 0x9, 0x3, 0x10, 0x8}, 0xb, &(0x7f0000000100)={0x5, 0xf, 0xb, 0x2, [@ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x6, [{0xc3, &(0x7f0000000140)=@string={0xc3, 0x3, "40f752f8de42968be4a68af73dc7a777758249a6c244da0eca28672deacaa45e987b548de14d1c86f8242ea90e0c08226bd7ee1ae7c439ff7736bf21ecba71b730702e432e08cf7fb1dd740c1049bf0196ac4cc0925195afc72f1b0f42b7c4d2ca8117ebb71840f448f3622b6011525d08211c0a484e06a14491546b4fa762fb1ed7942840358b5756eccbed66f2bf33023430a4c194a8dd002a5c38834a8898344c7eb9330a4f31e956f82ee74a8d059b63e9fe24644094b0783d30d656960737"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x43e}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x415}}, {0x6b, &(0x7f0000000300)=@string={0x6b, 0x3, "8fa25c9e6737d67ae9dcbf5eb197b620a9188f3a52321f89f69be13ff18291f79160b2d13d06fbe03f6d2d8fbe5bb4669abbf9328adb8b87fe0c3deae2b69f01f7a0aca0e151233da3d56949d78177944bd0197b11cc06ce51b9817c84f7ca46f0603edc9056afdce1"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x41c}}]}) 20:07:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000580)) fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:10 executing program 5: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x80000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) set_mempolicy(0x4000, &(0x7f00000000c0)=0x9, 0xfffffffffffffffd) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfff3}, {}, {0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x2c, 0x2, [@TCA_CGROUP_EMATCHES={0x28, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x0, 0x1, 0xeb}}}]}]}]}}]}, 0x5c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:07:10 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x8000000000008) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000a00), 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) bind$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000100)=0x11f) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='devices.list\x00', 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000007c0), &(0x7f0000000800)=0x4) unshare(0x2040000000) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000940)) r1 = socket(0xf, 0x4, 0x4) r2 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000c80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)) getpid() r4 = socket$inet(0x10, 0x2, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000980), 0xdd) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000020307051dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed0", 0x4a}], 0x1}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000600)={@empty, @multicast2}, &(0x7f0000000440)=0x2ec) getsockopt$inet_int(r2, 0x0, 0xe, &(0x7f0000000080), &(0x7f0000000500)=0x4) r5 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@remote}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) setsockopt$inet6_int(r5, 0x29, 0x4b, &(0x7f00000004c0)=0xa, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x4e22, 0xffffffff, @mcast1}, {0xa, 0x0, 0x0, @remote, 0x3ff}, 0x0, [0x0, 0xffffffff, 0xbeb, 0x4, 0x0, 0xff]}, 0x5c) [ 166.566305][T11702] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 166.589502][T11709] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 166.607845][T11716] FAULT_INJECTION: forcing a failure. [ 166.607845][T11716] name failslab, interval 1, probability 0, space 0, times 0 [ 166.609147][T11709] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 166.639642][T11716] CPU: 0 PID: 11716 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 166.648684][T11716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.659372][T11716] Call Trace: 20:07:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000580)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 166.662674][T11716] dump_stack+0x116/0x15d [ 166.667745][T11716] should_fail+0x231/0x240 [ 166.672170][T11716] __should_failslab+0x81/0x90 [ 166.677210][T11716] should_failslab+0x5/0x20 [ 166.681739][T11716] slab_pre_alloc_hook+0x20/0xb0 [ 166.686709][T11716] kmem_cache_alloc+0x4d/0x280 [ 166.692523][T11716] ? __d_alloc+0x36/0x370 [ 166.697291][T11716] ? security_inode_alloc+0x127/0x170 [ 166.703033][T11716] __d_alloc+0x36/0x370 [ 166.707183][T11716] ? current_time+0xdb/0x190 [ 166.711849][T11716] d_alloc_pseudo+0x1a/0x50 [ 166.716620][T11716] alloc_file_pseudo+0x63/0x130 [ 166.721481][T11716] __shmem_file_setup+0x13a/0x1c0 [ 166.726542][T11716] shmem_file_setup+0x37/0x40 [ 166.731321][T11716] __se_sys_memfd_create+0x1eb/0x360 [ 166.736965][T11716] __x64_sys_memfd_create+0x2d/0x40 [ 166.742168][T11716] do_syscall_64+0x39/0x80 [ 166.746698][T11716] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.752589][T11716] RIP: 0033:0x45de59 [ 166.756715][T11716] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.777408][T11716] RSP: 002b:00007f4c771afa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 166.785890][T11716] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de59 [ 166.794127][T11716] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 166.802105][T11716] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 [ 166.810505][T11716] R10: 00007f4c771afadc R11: 0000000000000246 R12: 0000000000000000 [ 166.818479][T11716] R13: 0000000020000080 R14: 0000000020001380 R15: 0000000020001440 [ 166.830411][ T16] usb 4-1: new high-speed USB device number 2 using dummy_hcd 20:07:11 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66644974da5761453043043cd03d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@ng, 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) getdents64(r2, &(0x7f0000000400)=""/200, 0xc8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000280)={0x2001}) dup3(r3, r0, 0x0) [ 166.943500][T11747] FAULT_INJECTION: forcing a failure. [ 166.943500][T11747] name failslab, interval 1, probability 0, space 0, times 0 [ 166.967316][T11748] fuse: Unknown parameter 'fdItWaE0C<' [ 166.972523][T11747] CPU: 1 PID: 11747 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 166.982469][T11747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.993510][T11747] Call Trace: [ 166.993982][T11750] fuse: Unknown parameter 'fdItWaE0C<' [ 166.996830][T11747] dump_stack+0x116/0x15d [ 167.007028][T11747] should_fail+0x231/0x240 [ 167.011815][T11747] __should_failslab+0x81/0x90 [ 167.016667][T11747] should_failslab+0x5/0x20 [ 167.021238][T11747] slab_pre_alloc_hook+0x20/0xb0 [ 167.026253][T11747] kmem_cache_alloc+0x4d/0x280 [ 167.031365][T11747] ? __alloc_file+0x2e/0x1f0 [ 167.036064][T11747] __alloc_file+0x2e/0x1f0 [ 167.040478][T11747] alloc_empty_file+0xcd/0x1c0 [ 167.045232][T11747] alloc_file+0x3a/0x280 [ 167.050083][T11747] alloc_file_pseudo+0xe2/0x130 [ 167.054980][T11747] __shmem_file_setup+0x13a/0x1c0 [ 167.059998][T11747] shmem_file_setup+0x37/0x40 [ 167.064675][T11747] __se_sys_memfd_create+0x1eb/0x360 [ 167.070038][T11747] __x64_sys_memfd_create+0x2d/0x40 [ 167.075232][T11747] do_syscall_64+0x39/0x80 [ 167.079734][T11747] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.085678][T11747] RIP: 0033:0x45de59 [ 167.089676][T11747] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.109301][T11747] RSP: 002b:00007f4c771afa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 167.117787][T11747] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de59 [ 167.125750][T11747] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 167.133716][T11747] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 [ 167.141837][T11747] R10: 00007f4c771afadc R11: 0000000000000246 R12: 0000000000000000 [ 167.150022][T11747] R13: 0000000020000080 R14: 0000000020001380 R15: 0000000020001440 [ 167.310401][ T16] usb 4-1: Using ep0 maxpacket: 8 [ 167.540831][ T16] usb 4-1: New USB device found, idVendor=0471, idProduct=012c, bcdDevice=ad.2c [ 167.549951][ T16] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=8 [ 167.561760][ T16] usb 4-1: SerialNumber: syz [ 167.610584][ T16] usb 4-1: config 0 descriptor?? [ 167.852758][ T4595] usb 4-1: USB disconnect, device number 2 [ 168.630460][ T16] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 168.880421][ T16] usb 4-1: Using ep0 maxpacket: 8 [ 169.081216][ T16] usb 4-1: New USB device found, idVendor=0471, idProduct=012c, bcdDevice=ad.2c [ 169.090428][ T16] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=8 [ 169.098493][ T16] usb 4-1: SerialNumber: syz [ 169.106720][ T16] usb 4-1: config 0 descriptor?? 20:07:13 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x535}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="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", 0xfc) 20:07:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000580)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8, 0x1, r1}, {0x8}, [@IFLA_GTP_FD1={0x8, 0x3}]}}}}]}, 0x48}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r2, &(0x7f0000000ea9)=""/407, 0x197) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x44, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_KEYS={0x10, 0x51, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}]}]}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="f0000000", @ANYRES16=0x0, @ANYBLOB="00081abd7000fedbdf251400000008000300", @ANYRES32=r6, @ANYBLOB="d100ac0079e9fffbd6229891311f97e857b7a08ee36574769c6a956085554030c03471a492da422805b0b2977b47c989c2d781af8b2c66e4ed2737a1e71296f2372658130840c0ff7ecc81e1891f7b251060a70c220107033608d05d401a91d6d2da8b18e22283a5911f1ae2c9142e3ce880713e31128d49176915eb7f5f1826482f7cb59b11a9ec9ac6db19812291e733f3cb7492e9ffd2aa00115c7a39382025e785ffadf1c578087b5479202bca14717d8970da36664b92d90a099d4b460e7c8d7e4f4cb90413f81d15fb1b096f850a000000"], 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 20:07:13 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {}, @cond}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x2000004, 0x10, 0xffffffffffffffff, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)="ba21", 0x2}, 0x1, 0x0, 0x0, 0x4008000}, 0x4800) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) sendmsg$inet(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x20000000) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 20:07:13 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x202480, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000200)) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r3, &(0x7f0000000ea9)=""/407, 0x197) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x4, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_CHAIN_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00217edb650388dd3a"], 0x48}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000580)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005ffe600313a09d39a7628ee2c9e353cb790dbb2bac0c7a956c5cafedc9a2e5519f948e9936bc67916a1e38498e7ea0169c4deb20695ff440cc8ca00c09025715dea6d8c59d9e10ec09eb5b1a405d8fde3949e6ed9b1ed2fb99340b1cc03053f7ae2763f44179c130a17cecae3e9c8d11ab35a15e62dd3d4d297c76a8d", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001980)=@newtfilter={0x40, 0x2c, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x14, 0x2, [@TCA_U32_FLAGS={0x8}, @TCA_U32_HASH={0x8}]}}]}, 0x40}}, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x45, 0x402000) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x7, 0x7}) r7 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 169.360525][ T4595] usb 4-1: USB disconnect, device number 3 [ 169.425273][T11787] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 169.436358][T11792] FAULT_INJECTION: forcing a failure. [ 169.436358][T11792] name failslab, interval 1, probability 0, space 0, times 0 [ 169.444116][T11789] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:07:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 169.462564][T11795] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 169.507468][T11794] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 169.517400][T11792] CPU: 0 PID: 11792 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 169.525790][T11792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.535914][T11792] Call Trace: [ 169.539203][T11792] dump_stack+0x116/0x15d [ 169.543555][T11792] should_fail+0x231/0x240 [ 169.548027][T11792] __should_failslab+0x81/0x90 [ 169.552783][T11792] should_failslab+0x5/0x20 [ 169.557293][T11792] slab_pre_alloc_hook+0x20/0xb0 [ 169.562335][T11792] kmem_cache_alloc+0x4d/0x280 [ 169.567405][T11792] ? security_file_alloc+0x2e/0x190 [ 169.572669][T11792] ? kmem_cache_alloc+0x11a/0x280 [ 169.577787][T11792] security_file_alloc+0x2e/0x190 [ 169.582888][T11792] __alloc_file+0x83/0x1f0 [ 169.587299][T11792] alloc_empty_file+0xcd/0x1c0 [ 169.592083][T11792] alloc_file+0x3a/0x280 [ 169.596316][T11792] alloc_file_pseudo+0xe2/0x130 [ 169.601175][T11792] __shmem_file_setup+0x13a/0x1c0 [ 169.606298][T11792] shmem_file_setup+0x37/0x40 [ 169.610982][T11792] __se_sys_memfd_create+0x1eb/0x360 [ 169.616288][T11792] __x64_sys_memfd_create+0x2d/0x40 [ 169.621478][T11792] do_syscall_64+0x39/0x80 [ 169.625989][T11792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.631956][T11792] RIP: 0033:0x45de59 [ 169.636019][T11792] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.659455][T11792] RSP: 002b:00007f4c771afa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 169.667871][T11792] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de59 [ 169.675894][T11792] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 169.683895][T11792] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 [ 169.691869][T11792] R10: 00007f4c771afadc R11: 0000000000000246 R12: 0000000000000000 [ 169.700345][T11792] R13: 0000000020000080 R14: 0000000020001380 R15: 0000000020001440 20:07:14 executing program 2: set_mempolicy(0x2, &(0x7f0000000300)=0x75f, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xffff}, 0x8) r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000040)) [ 169.720438][T11795] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 169.733713][T11795] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 20:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 20:07:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0xfb, 0x0, 0x400000006, 0x1, 0x400000000000000]}) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x10260, 0x80000000, 0x0, 0x3, 0x2000000000000, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x5e22, @local}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x6, 0x0, 0xfffffffffffffffc], 0x100000, 0x80a84}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:07:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202eaf7c9bc2c866576c6530"], 0x34) sendto$inet(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x23) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e1040300"/25}, 0x24) 20:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 20:07:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="d6fdffff100005070000f2000000000000000000cd8d44fb66b269a03a0e72f711d1cb01f22656acebc92b074e93f3547de34e0830f8ce5548fd320da8e923306ffe4ad103aa08324db727ff7ed94a466d798231fedde292b0191a37428d745f03536bc8927e692a27fdc600fc6b26b884b1c1dc851ef2f99d77550f34c4526a7dae3ece4f2805296add09b6f9a2238fa08fd74a848e", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b0001006272696467650000100002809e4a7ea7aacd5fdfbd9c12ff766a4775fb4becee15833cf696cb8f1272341b42f5d74fd64eedd226b3d3fae5b68a7aff1c435a610e78a33fab884b79151da3ff0a1ff1a5add8af1faa2f073aa9b610149b0ccbc5fabc5db0445b1240dcf2ae3bfff753cb1ccff89cf035354172e6be78ebb6009f3ab5573ad8d36ae632faeb51f5a7743a3a27d717df2b4af98c48bf906ed4d5b9fb1ac1814c0d2a6a0e0520182b163e8f636115a2b40374fb"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000006c0)='U', 0x1, r1) keyctl$clear(0x7, r1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SOUND_MIXER_WRITE_RECSRC(r2, 0xc0044dff, &(0x7f0000000080)=0x7) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x13, 0x2, {0x0, 0x2, 0x6}}, 0x14) 20:07:14 executing program 3: r0 = semget(0x1, 0x3, 0x20) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)=[0x8001, 0x2, 0x8001]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000140)={[{@utf8='utf8=1'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 20:07:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b000100627269646765000014000280050019000000000008001a0000000000b2f383d2c4b74e23149bdd257ddf7daef83c61a4958688ebae3b654b493325e79156033c"], 0x44}}, 0x0) [ 170.061534][T11841] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 170.110676][T11845] FAT-fs (loop3): Unrecognized mount option "fscontext=sysadm_u" or missing value 20:07:14 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x44, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_KEYS={0x10, 0x51, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}]}]}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r3, 0x800, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "486527f4962b996c3ff61fdd0a779e1f"}, @NL80211_ATTR_PMK={0x14, 0xfe, "c3af749b35d46772aada66be951d6e8f"}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x8044) sendmsg$NFT_BATCH(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x5, 0x2, 0x0, 0x1, [{0x4, 0x2}]}]}]}], {0x14}}, 0x70}}, 0x0) 20:07:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:14 executing program 5: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vim2m\x00', 0x2, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000580)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}) 20:07:14 executing program 3: r0 = syz_io_uring_complete(0x0) read$dsp(r0, &(0x7f0000000080)=""/110, 0x6e) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000140)) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000004001400d000020004000060", 0x20}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4e9cbd0d7904f50e548e0df7be4f86befcf9b7982dfb18399227dd1f764a6e945a9bc1e80460cf0563eb50f26beb183f476ab9f1e23062b5fd3664e74a"]) 20:07:14 executing program 2: syz_read_part_table(0x1, 0x2, &(0x7f0000000080)=[{&(0x7f0000000180)="2a328537374b961603e49b0e6064b0b76d5e9183ce41a72697eb03ec5f487e17703719f62e24d8db22e74ab201534487028802bc342d88bf25fc4d17bf41bcd3d7b26b8713c348ca938c1baa64367c938c74dc676f6cbe2fe7dad3edf927500a7e525c0b61394437e6f6ed683cc9cd169a5b0e6a38cc63f52ab66db4f9529711ad137fde4fafe4ce24cea5cf11ceed422f82639792ddbe989da2fbbbaf37864d17b74ff3e1cdcaf34b0e16fb9eff4e2a31711d16fbe6f8cf88ab206b3d770291ececaec047ea", 0xc6, 0x7810}, {&(0x7f0000000280)="a88b9d693bae93667063e002362afd4de6c1f3cf6b7f30580f60c527fc5869cb3ffe69641be330bea69b24ed95be7ea4ad3b274b5e3e3ee55f0e1946d45f9d6aa087eeb2f9aab14a56435cc13747485105081dc3763230231c7469f6b85fd4e28d", 0x61, 0xb0a}]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x2e]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x0, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, 0x0, 0x0}, 0x20) [ 170.275948][T11860] FAULT_INJECTION: forcing a failure. [ 170.275948][T11860] name failslab, interval 1, probability 0, space 0, times 0 [ 170.294439][T11860] CPU: 0 PID: 11860 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 170.302823][T11860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.312893][T11860] Call Trace: [ 170.316229][T11860] dump_stack+0x116/0x15d [ 170.320573][T11860] should_fail+0x231/0x240 [ 170.325058][T11860] __should_failslab+0x81/0x90 [ 170.329828][T11860] should_failslab+0x5/0x20 [ 170.335642][T11860] slab_pre_alloc_hook+0x20/0xb0 [ 170.340883][T11860] __kmalloc+0x73/0x2c0 [ 170.345065][T11860] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 170.350804][T11860] tomoyo_realpath_from_path+0x98/0x3b0 [ 170.356353][T11860] tomoyo_path_perm+0xc6/0x330 [ 170.361197][T11860] ? slab_pre_alloc_hook+0x20/0xb0 [ 170.366311][T11860] tomoyo_path_truncate+0x18/0x20 [ 170.371498][T11860] security_path_truncate+0x7f/0xd0 [ 170.376692][T11860] do_sys_ftruncate+0x2fa/0x3e0 [ 170.381725][T11860] ? fpregs_assert_state_consistent+0x7d/0x90 [ 170.387796][T11860] __x64_sys_ftruncate+0x2f/0x40 [ 170.393094][T11860] do_syscall_64+0x39/0x80 [ 170.397841][T11860] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.403820][T11860] RIP: 0033:0x45de27 [ 170.407710][T11860] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.427437][T11860] RSP: 002b:00007f4c771afa28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 170.436288][T11860] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de27 [ 170.444284][T11860] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 0000000000000004 [ 170.453134][T11860] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 [ 170.461729][T11860] R10: 00007f4c771afadc R11: 0000000000000217 R12: 0000000000000000 20:07:14 executing program 5: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x181, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000000a1400022ebd7000fedbdf25080015000400000008001500000000000800010000000000080001000000000008000100f17e789f5174020000000800150004000000080003000400000008001500030000000800"], 0x58}, 0x1, 0x0, 0x0, 0x4002000}, 0x40004) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4004743a, 0x0) 20:07:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000bc0)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="34f7ff003ccdf021b77bc8ff0c07e1507b5256be55e981a8286177f13be2c18a7c4023cfc1e845f967a343aa5777afcd8135fb305e907b727206a24cd4e3fc2d56ae6c", @ANYRES16=r3, @ANYBLOB="010000000000000000008900000008000300", @ANYRES32=r2, @ANYBLOB="18001d801400008005000800fc000000060005009b000000"], 0x34}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r4, &(0x7f0000000ea9)=""/407, 0x197) sendmsg$NL80211_CMD_START_NAN(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x44, r3, 0x0, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1f}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x40}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008040}, 0x8c0) [ 170.469697][T11860] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020001440 [ 170.483040][T11860] ERROR: Out of memory at tomoyo_realpath_from_path. 20:07:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 170.522614][T11863] squashfs: Unknown parameter 'NyTO-9'vJnZ`cPk?Gj0b6dJ' [ 170.544965][T11878] IPVS: ftp: loaded support on port[0] = 21 [ 170.561609][T11860] befs: Unrecognized mount option "audit" or missing value 20:07:15 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000001340)={0x90, 0x3, 0x1, 0x3, 0x0, 0x0, {0xf, 0x0, 0x6}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7f}]}, @CTA_SEQ_ADJ_REPLY={0x24, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x91b0}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_SEQ_ADJ_REPLY={0x34, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xfba}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x41}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2fdd}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x800}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}]}, 0x90}, 0x1, 0x0, 0x0, 0x20004804}, 0x24000410) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000340)={{}, "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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c866b94d0900000f320f0133f30f01e80f69e8650f01c883dd000f0131ba400c3ef20f2c2b66efbafc0ced", 0x33}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x200000000000203, 0x0, 0x4ca]}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 170.581995][T11860] befs: (loop1): cannot parse mount options [ 170.595728][T11878] IPVS: ftp: loaded support on port[0] = 21 [ 170.611791][T11902] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:15 executing program 5: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xe) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x181, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000000a1400022ebd7000fedbdf25080015000400000008001500000000000800010000000000080001000000000008000100f17e789f5174020000000800150004000000080003000400000008001500030000000800"], 0x58}, 0x1, 0x0, 0x0, 0x4002000}, 0x40004) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4004743a, 0x0) 20:07:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:15 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 170.734590][T11942] IPVS: ftp: loaded support on port[0] = 21 20:07:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000003c0)={0x42, 0x1, 0x0, "dc8e6d38cb52f5caba2f0aea0f7484818b7402bdbfe3fff295a8c9c1728712eb"}) r1 = syz_io_uring_complete(0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000080)={0x33c, 0x12, 0x10, 0x70bd2d, 0x25dfdbfc, {0x15, 0x2, 0x3, 0xff, {0x4e23, 0x4e22, [0x1, 0x7, 0xffffff28, 0x6], [0x6, 0x1, 0x1, 0x4], 0x0, [0x80000001, 0x6]}, 0x400, 0x8}, [@INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "2f253e90e43f7add17e28c4a93dfb9f01bc50dec18a82ad81e93e86c3ada4912fc217cf3f45afb2df742961083595a5170bce9d7a015b8657edc657dccd10633f2b6d6a9baebca"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "d4095f7fd3fc6cfe9b7248ecba096ffc49c72f85ef956b66a0e6434056b0df1b59d50e8b3fe8c090c88477d6439619b6a583b481f4239e926654ca32c7fc3d0cde964dfda71c4ea5be1ea21395353997809715b239469035aa7263e2c54a52605073a399ed4ec3c2bfff288e09bb0b3f350a41242f13cc14a27b29087a2e57d90e04c1e301458d720d7519750715979da32dc10130d5613bdb4c31633968d81713e79c21d759d8b4420a2ee4f162e08be3531a736baabed5a975af74ad6f5e8198b7b3df41d35210c28e29c1e5075bef62f187dd5ef58f50af3a0797b6308b68f58a80994a383443e7"}, @INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "267ff859a09bee5af4b7109f5d4e65119e370e7d3684a2c3587b33b47c07d28a6b670910f48135a4f79c05adf6802179d2dd4cfd5a833c7b2d597051c271aec03fe080d266f40a28befa2ca05b07023db5db931972ff98d0d9bab2b30970ad5b4b26246aac9a12bdd59371174cc4df8b7cf442cf5cfa8b4b98536de89512e866c7ca462c036dcfdbe1ee4c0f99c12e098bb775defe9ccc0cb18789217530981e4d37c5e6b4"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "f44bc90387ce4ea4b09932d4fb055d16ece4cb97ccec732dbd7aad8022a9b8f839c708e6e5e979c2fa2bb67e9005d22930b8ce3966a301bfe521ba4859b465eeccaccc6700247ae78ed0cabd686c1555458895fa5678ddc5575b1fa26fdd3988f545e18809bb77244d6803622c97d7c8c8e3056249cfff7f3ea275158702d3584a970951656a245824d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "2341dfec5b531bf0491ed67731d628876794598231199932f18e4fccab3d765fab7dc184ce0ebc0e86cf49a953bca4456027ea6396305485a43ea906105947db5dd15533dcd54423c7bef266f1eb7f97ae3f45f104bf9dd8d26beb2e60a36666235230dbe5af0e6cf7d3213a5f730651bce8716d"}]}, 0x33c}, 0x1, 0x0, 0x0, 0x40894}, 0x10) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000480)={0x53}) 20:07:15 executing program 5: ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/242) r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000b80)={{0x12, 0x1, 0x0, 0x39, 0x22, 0xcd, 0x40, 0x13d3, 0x3362, 0x1a8a, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x78, 0x0, 0x1, 0x67, 0x64, 0xe5, 0x0, [], [{{0x9, 0x5, 0x89, 0x2, 0x8}}]}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) ioctl$KDENABIO(r1, 0x4b36) 20:07:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 170.832184][T11966] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 170.837817][T11970] FAULT_INJECTION: forcing a failure. [ 170.837817][T11970] name failslab, interval 1, probability 0, space 0, times 0 20:07:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 170.956484][T11985] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 170.980351][T11970] CPU: 0 PID: 11970 Comm: syz-executor.1 Not tainted 5.9.0-syzkaller #0 [ 170.988691][T11970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.000845][T11970] Call Trace: [ 171.005150][T11970] dump_stack+0x116/0x15d [ 171.009722][T11970] should_fail+0x231/0x240 [ 171.014741][T11970] __should_failslab+0x81/0x90 [ 171.019827][T11970] should_failslab+0x5/0x20 [ 171.024412][T11970] slab_pre_alloc_hook+0x20/0xb0 [ 171.029433][T11970] __kmalloc+0x73/0x2c0 [ 171.033622][T11970] ? tomoyo_encode2+0x1d3/0x350 [ 171.038491][T11970] ? should_failslab+0x5/0x20 [ 171.043161][T11970] tomoyo_encode2+0x1d3/0x350 [ 171.047936][T11970] ? dynamic_dname+0xf0/0xf0 [ 171.052556][T11970] tomoyo_realpath_from_path+0x35e/0x3b0 [ 171.058478][T11970] tomoyo_path_perm+0xc6/0x330 [ 171.063341][T11970] ? slab_pre_alloc_hook+0x20/0xb0 [ 171.068450][T11970] tomoyo_path_truncate+0x18/0x20 [ 171.073912][T11970] security_path_truncate+0x7f/0xd0 [ 171.079104][T11970] do_sys_ftruncate+0x2fa/0x3e0 [ 171.084021][T11970] ? fpregs_assert_state_consistent+0x7d/0x90 [ 171.090181][T11970] __x64_sys_ftruncate+0x2f/0x40 [ 171.095289][T11970] do_syscall_64+0x39/0x80 [ 171.099875][T11970] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 171.105844][T11970] RIP: 0033:0x45de27 [ 171.109765][T11970] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.129990][T11970] RSP: 002b:00007f4c771afa28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 171.138494][T11970] RAX: ffffffffffffffda RBX: 0000000020001380 RCX: 000000000045de27 [ 171.147413][T11970] RDX: 00007f4c771afae0 RSI: 0000000000000000 RDI: 0000000000000004 20:07:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000003c0)={0x42, 0x1, 0x0, "dc8e6d38cb52f5caba2f0aea0f7484818b7402bdbfe3fff295a8c9c1728712eb"}) r1 = syz_io_uring_complete(0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000080)={0x33c, 0x12, 0x10, 0x70bd2d, 0x25dfdbfc, {0x15, 0x2, 0x3, 0xff, {0x4e23, 0x4e22, [0x1, 0x7, 0xffffff28, 0x6], [0x6, 0x1, 0x1, 0x4], 0x0, [0x80000001, 0x6]}, 0x400, 0x8}, [@INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "2f253e90e43f7add17e28c4a93dfb9f01bc50dec18a82ad81e93e86c3ada4912fc217cf3f45afb2df742961083595a5170bce9d7a015b8657edc657dccd10633f2b6d6a9baebca"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "d4095f7fd3fc6cfe9b7248ecba096ffc49c72f85ef956b66a0e6434056b0df1b59d50e8b3fe8c090c88477d6439619b6a583b481f4239e926654ca32c7fc3d0cde964dfda71c4ea5be1ea21395353997809715b239469035aa7263e2c54a52605073a399ed4ec3c2bfff288e09bb0b3f350a41242f13cc14a27b29087a2e57d90e04c1e301458d720d7519750715979da32dc10130d5613bdb4c31633968d81713e79c21d759d8b4420a2ee4f162e08be3531a736baabed5a975af74ad6f5e8198b7b3df41d35210c28e29c1e5075bef62f187dd5ef58f50af3a0797b6308b68f58a80994a383443e7"}, @INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "267ff859a09bee5af4b7109f5d4e65119e370e7d3684a2c3587b33b47c07d28a6b670910f48135a4f79c05adf6802179d2dd4cfd5a833c7b2d597051c271aec03fe080d266f40a28befa2ca05b07023db5db931972ff98d0d9bab2b30970ad5b4b26246aac9a12bdd59371174cc4df8b7cf442cf5cfa8b4b98536de89512e866c7ca462c036dcfdbe1ee4c0f99c12e098bb775defe9ccc0cb18789217530981e4d37c5e6b4"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "f44bc90387ce4ea4b09932d4fb055d16ece4cb97ccec732dbd7aad8022a9b8f839c708e6e5e979c2fa2bb67e9005d22930b8ce3966a301bfe521ba4859b465eeccaccc6700247ae78ed0cabd686c1555458895fa5678ddc5575b1fa26fdd3988f545e18809bb77244d6803622c97d7c8c8e3056249cfff7f3ea275158702d3584a970951656a245824d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "2341dfec5b531bf0491ed67731d628876794598231199932f18e4fccab3d765fab7dc184ce0ebc0e86cf49a953bca4456027ea6396305485a43ea906105947db5dd15533dcd54423c7bef266f1eb7f97ae3f45f104bf9dd8d26beb2e60a36666235230dbe5af0e6cf7d3213a5f730651bce8716d"}]}, 0x33c}, 0x1, 0x0, 0x0, 0x40894}, 0x10) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000480)={0x53}) [ 171.155641][T11970] RBP: 0000000000000000 R08: 00007f4c771afad8 R09: 0000000000000000 [ 171.163840][T11970] R10: 00007f4c771afadc R11: 0000000000000217 R12: 0000000000000000 [ 171.171815][T11970] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020001440 20:07:15 executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10411, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x32}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000440), 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000fed000/0x13000)=nil, 0x13000}, &(0x7f0000000180)=0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @ipv4={[], [], @loopback}, 0x7}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x67) [ 171.340498][ T9486] usb 6-1: new high-speed USB device number 6 using dummy_hcd 20:07:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 171.516168][T12004] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 171.556665][T12008] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[], 0x220) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) fsmount(0xffffffffffffffff, 0x0, 0x82) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x10001}) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xdbd}) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 20:07:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 171.603439][T11970] ERROR: Out of memory at tomoyo_realpath_from_path. 20:07:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:16 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 171.750829][ T9486] usb 6-1: config 0 has an invalid interface number: 120 but max is 0 [ 171.759962][ T9486] usb 6-1: config 0 has no interface number 0 [ 171.764117][T12025] befs: Unrecognized mount option "audit" or missing value [ 171.793260][T12025] befs: (loop1): cannot parse mount options [ 171.815909][ T9486] usb 6-1: config 0 interface 120 altsetting 0 bulk endpoint 0x89 has invalid maxpacket 8 [ 171.832543][ T9486] usb 6-1: New USB device found, idVendor=13d3, idProduct=3362, bcdDevice=1a.8a [ 171.850422][ T9486] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 171.869306][ T9486] usb 6-1: config 0 descriptor?? [ 171.910949][T11987] raw-gadget gadget: fail, usb_ep_enable returned -22 20:07:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1d, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000061100000000000c600000000000000950000000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x4}, 0x10) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x360) close(r2) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r1, 0x4}, 0x10) 20:07:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x140) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$IOCTL_STOP_ACCEL_DEV(r0, 0x40096101, &(0x7f0000000100)={{}, 0x20}) getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair(0x18, 0x4, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000003b2a41861e688d1f4a749dbe0d3ecaec5856401f5ec606b36ff425be6bafe58d75baab1cf21a5fb674a47342ea49c639817374a3461f5af30222a41da43050dd9023f459c79b209b79d588f4dcad1d7fa61621f6b2fa89c0aced6c3aa483394ff93d5847052e54b539ad66bba35707aa63fb99ac683974b49f3e45f2d152fea20801726159457fdd1e5dfabcd0fddf1f33b887", @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250600000008aa597eb4"], 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3e}}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:pam_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:newrole_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4051}, 0x8000) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r5}, 0x50) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x100000001) syz_fuse_handle_req(r2, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x441, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) ftruncate(r7, 0x40) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000080)=ANY=[], 0xfffffdef) 20:07:18 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:18 executing program 2: syz_read_part_table(0xfffffffffffffffd, 0x1, &(0x7f00000013c0)=[{&(0x7f0000000300)="4b3fd255501a967bbccef2a1747a4099f43b99a3c29f0bac068ff214b7bf5b6b1a8bed5df9c27b047eee643f000000000000004529d777f06c4ffda7fbce6d61246cb8dcf1628d9cb95fff84ae40e210de7cd10d16ca4408ddd2f4fcf6e05eaf91d4f5ea0486ed9d39dbd3d0e78bbccc5d4a611eb335b9a13deeb01ece5b9038f0de9d52b5da1ee071148c887a3c500c023222e36a671e6e1fe16658130897f62afebb03bc4040a2bd987e0f735ec52a3c702ed4bcbd46ccf8a7209fccf5e15d464c02b706224164c92c3d9c063c2164989fb11c4d187fae2c3c86b37ebd54cb47a218070e8590918f844318434e095452df2cf28923248e7a5d0899910cc74eb02ea2ac773035bf4c2f58855061b26b2a75ed43c629a6924de336f69856da35d7810bb7401af45209d6b2511905eb5dcfda23aec7b61a9c29f4a8d7842c621c859f6c93e2933f8f46ca6b465e015cb62e2a91c3ecd06678172ded2b35776f27794aae54a837d6feeac88fcb62ecf90d3a928ce2c3b3a25faf67e303aae5b3f2590050dcd5f1116943edd311076fd0b626c471c93f7950f306306cb714d3bf0c19ca094f3877d19669c895798f6a0a288b2edfefd0dc53e0abd6245e21091acc6609ff67c323fbe9b4f1a617ce38f283bccc975882d7169eb31f15fa9d5381650c1cd05b0843184ebcf1360bcd451589d96db646ca656e81d46e74839770640af74b341abca2716344067249398f77a20734bc84f01ecb2dd74932534803d51b93a131565aa52c8516bc5a85971ef494aed7a110aa222e76cc8dab8daf0abe4e37a2c60aff3c3f0cafb907e5a26dd41ac7cf7b8b385da9e6979f89bcb0ea7d004034fed452ccb2a0d5c7e3311635f7a836c6e8f4a1073661db2cba20d5605bd5eea941982b16f9c25c2ca221865cdcba1ff910d4263af0cbb85fdff4565d3b7c93c19b20218237b1ca4e2221a96a6055c32b44bcd3c465b3a11f1fca1731fe8e92215163bb7c8383ae247c4dd0c8f8299fbfafb95f86e045902cfd0d51c58cda63b1e86a35597b0e9545e2c3b311f3b3b867", 0x2f2}]) 20:07:18 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 173.911779][ T16] usb 6-1: USB disconnect, device number 6 [ 173.971181][T12062] befs: Unrecognized mount option "audit" or missing value 20:07:18 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 174.015257][T12062] befs: (loop1): cannot parse mount options 20:07:18 executing program 5: r0 = socket(0x2, 0x3, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r1 = accept$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r2 = accept$inet6(r0, &(0x7f0000000200), &(0x7f0000000240)=0x1c) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r3, 0xc0045004, &(0x7f0000000580)) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r4, 0xc0045004, &(0x7f0000000580)) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000480)=@abs={0x0, 0x0, 0x4e24}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r1, r2, r4, r3, r4]}}], 0x30}, 0x0) 20:07:18 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 174.201159][T12062] befs: Unrecognized mount option "audit" or missing value [ 174.237758][T12094] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! [ 174.239002][T12062] befs: (loop1): cannot parse mount options 20:07:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x87, 0x4, 0x1f, 0x0, 0x0, 0x5, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x101, 0x16}, 0x5002, 0x4, 0x3, 0x1, 0x100, 0x4, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f00000000c0)={0xb186, 0x7ff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="74696d655f6f6666738c63575aa30ed8bb3165b08af2a89f489634fdd165743db0a845533b628235a50a9c316b4a9c42dbf899a8232d3978b71c0c4ba20ee73143abfd64aca08d78d15b0eedde23ef18c9b36d196d96267f4d1f698c4c25400f2ad4e5dc52824543a2d1406a8f30fa273ba08ce0060d52be224a2d09a81b1e9f00bd33feb7607e4455ad521687b24ad031bdeabe000000009f7877766656d12a9a8615d36a36a18e9f1221eddaba602a3672cbea0028615e466007376edd9afe0304315dee212d8495f2dafc6d19"]) 20:07:18 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 174.430844][T12111] FAT-fs (loop2): Unrecognized mount option "time_offscWZػ1eH4et=ES;b5 [ 174.430844][T12111] 1kJB#-9x K1Cdx[#ɳmm&MiL%@*REC@j0';R"J- " or missing value [ 174.530804][T12118] FAT-fs (loop2): Unrecognized mount option "time_offscWZػ1eH4et=ES;b5 [ 174.530804][T12118] 1kJB#-9x K1Cdx[#ɳmm&MiL%@*REC@j0';R"J- " or missing value 20:07:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x140) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$IOCTL_STOP_ACCEL_DEV(r0, 0x40096101, &(0x7f0000000100)={{}, 0x20}) getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair(0x18, 0x4, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000003b2a41861e688d1f4a749dbe0d3ecaec5856401f5ec606b36ff425be6bafe58d75baab1cf21a5fb674a47342ea49c639817374a3461f5af30222a41da43050dd9023f459c79b209b79d588f4dcad1d7fa61621f6b2fa89c0aced6c3aa483394ff93d5847052e54b539ad66bba35707aa63fb99ac683974b49f3e45f2d152fea20801726159457fdd1e5dfabcd0fddf1f33b887", @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250600000008aa597eb4"], 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3e}}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:pam_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:newrole_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4051}, 0x8000) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r5}, 0x50) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x100000001) syz_fuse_handle_req(r2, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x441, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) ftruncate(r7, 0x40) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000080)=ANY=[], 0xfffffdef) 20:07:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x1007, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000003f991f7c3341f069ca24957d1773684d3ec394eb2b9140ed44f46eed3a89326a3c8ce0c391a7608c423d209f9378db1615aa4d52c56dfd3b8046b011", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xe2, &(0x7f0000000180)=""/226, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:07:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:19 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x2}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e22, @rand_addr=0x64010101}, @in6={0xa, 0x4e21, 0x100, @dev={0xfe, 0x80, [], 0x21}, 0x7fff}, @in6={0xa, 0x4e23, 0x5, @rand_addr=' \x01\x00', 0x80000000}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0xab8, @local, 0x6e79}, @in6={0xa, 0x4e22, 0xffdc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}], 0xa0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r2, &(0x7f0000000ea9)=""/407, 0x197) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) 20:07:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x140) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$IOCTL_STOP_ACCEL_DEV(r0, 0x40096101, &(0x7f0000000100)={{}, 0x20}) getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair(0x18, 0x4, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000003b2a41861e688d1f4a749dbe0d3ecaec5856401f5ec606b36ff425be6bafe58d75baab1cf21a5fb674a47342ea49c639817374a3461f5af30222a41da43050dd9023f459c79b209b79d588f4dcad1d7fa61621f6b2fa89c0aced6c3aa483394ff93d5847052e54b539ad66bba35707aa63fb99ac683974b49f3e45f2d152fea20801726159457fdd1e5dfabcd0fddf1f33b887", @ANYRES16=r4, @ANYBLOB="020029bd7000fddbdf250600000008aa597eb4"], 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3e}}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:pam_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:newrole_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4051}, 0x8000) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r5}, 0x50) mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x100000001) syz_fuse_handle_req(r2, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x441, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) ftruncate(r7, 0x40) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000080)=ANY=[], 0xfffffdef) 20:07:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:19 executing program 2: syz_usb_connect(0x0, 0xab, &(0x7f0000000000)=ANY=[@ANYRES64], 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0xa1) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x14}, 0xfffffffb}}}, 0xa0) r2 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, 0x140a, 0x100, 0x70bd2c, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) [ 174.854284][T12142] befs: Unrecognized mount option "audit" or missing value [ 174.880490][T12142] befs: (loop1): cannot parse mount options [ 174.956673][T12142] befs: Unrecognized mount option "audit" or missing value [ 174.965106][T12142] befs: (loop1): cannot parse mount options 20:07:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 175.059532][T12169] befs: Unrecognized mount option "audit" or missing value [ 175.069575][T12169] befs: (loop1): cannot parse mount options [ 175.136500][T12169] befs: Unrecognized mount option "audit" or missing value [ 175.152019][T12169] befs: (loop1): cannot parse mount options [ 175.280574][ T8985] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 175.550506][ T8985] usb 3-1: device descriptor read/64, error 18 20:07:20 executing program 3: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1b, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100"/32, 0x20, 0x8000}, {&(0x7f0000010100)="004e535230320100"/32, 0x20, 0x9000}, {&(0x7f0000010200)="0054454130310100"/32, 0x20, 0xa000}, {&(0x7f0000010300)="01000200df0001009f3ff0010c0000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/128, 0x80, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1c5c281c002a4c696e7578205544464653000000000000000000000004050000", 0xe0, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100"/32, 0x20, 0xc1e0}, {&(0x7f0000010600)="06000200820001002895ae010d00000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x60, 0xd000}, {&(0x7f0000010700)="000000000000000000000000000000000000000900100000002a4f5354412055444620436f6d706c69616e74000000005001000000000000001000000100000000000000000000000600000001000000002a4c696e75782055444646530000000000000000000000040500"/128, 0x80, 0xd0c0}, {&(0x7f0000010800)="0000000000000000000000000000000000a00000120000000106010000000000", 0x20, 0xd1a0}, {&(0x7f0000010900)="05000200f300010005e7f0010e0000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000000000000000000001000"/96, 0x60, 0xe000}, {&(0x7f0000010a00)="000000000000000000000000000000000000000000000000030000001c00000020000000002a4c696e7578205544464653000000000000000000000004050000", 0x40, 0xe0a0}, {&(0x7f0000010b00)="07000200ba00010098f910000f0000000600000001000000003000003c000000", 0x20, 0xf000}, {&(0x7f0000010c00)="0400020004000100aa52f0011000000004000000002a554446204c5620496e666f00000000000000000000005001040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0x8}, {&(0x7f0000010d00)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405000000000000", 0xa0, 0x100e0}, {&(0x7f0000010e00)="080002000d0001000000f0011100"/32, 0x20, 0x11000}, {&(0x7f0000010f00)="090002001c0001000c7c7600120000000010e4070913122c1d411b590100000000000000000000001700000000000000000000000000000000000000000000000000000000000000010000002e0000001300000020000000002a4c696e757820554446465300000000000000000000000405000000000000050000000200000050015001010200"/160, 0xa0, 0x11fff}, {&(0x7f0000011000)="080102005e00010099b1080000000000200000000400000000e0ffff00000000", 0x20, 0x1c000}, {&(0x7f0000011100)="000102005e0001005612f001010000007810e4070913142c1c5c281c0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600000000000000", 0x80, 0x1d000}, {&(0x7f0000011200)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900200000020000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001000000000000", 0xe0, 0x1d0e0}, {&(0x7f0000011300)="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", 0x1c0, 0x1e000}, {&(0x7f0000011500)="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"/320, 0x140, 0x20000}, {&(0x7f0000011700)="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"/1248, 0x4e0, 0x21000}, {&(0x7f0000011c00)="05010200190001001b15da000600000000000000040000000100000c00000000000003000000000000000000f77e000001000000000000003a0000000000000000000000000000000010e4070913122c1d40225a0010e4070913122c1d40225a0010e4070913122c1d40225a0100000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001200000000000000000000003a000000010000000504000008746d70051600000873797a2d696d61676567656e363230313334393531050600000866696c6530050600000866696c653000"/256, 0x100, 0x22000}, {&(0x7f0000011d00)="05010200cc000100aa68aa000700000000000000040000000100000500000000000003000000000000000000a57c000001000000000000000a0000000000000000000000000000000010e4070913122c1d40225a0010e4070913122c1d40225a0010e4070913122c1d40225a0100000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001300000000000000000000000a00000073797a6b616c6c657273000000000000", 0xc0, 0x23000}, {&(0x7f0000011e00)="05010200fb000100d367b0000800000000000000040000000100000500000000000001000000000000000000a57c00000200000000000000282300000000000003000000000000000010e4070913122c1d40225a0010e4070913122c1d40225a0010e4070913122c1d40225a0100000000000000000000000000000000000000002a4c696e75782055444646530000000000000000000000040500000000000014000000000000000000000010000000282300000900"/192, 0xc0, 0x24000}, {&(0x7f0000011f00)="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"/288, 0x120, 0x28000}, {&(0x7f0000012100)="02000200690001001d17f0013f000000006000000c000000006000000c000000", 0x20, 0x3f000}], 0x0, &(0x7f0000012200)) 20:07:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:20 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:20 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 175.738013][T12190] befs: Unrecognized mount option "audit" or missing value [ 175.748735][T12190] befs: (loop1): cannot parse mount options 20:07:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:20 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12f669ac6200004026093333400000000001090224000100000000090400000103010000092100000001220100290581030800000000"], 0x0) r1 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) setsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040)=0x1, 0x4) syz_usb_control_io(r0, 0x0, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000100)=0x8) syz_usb_ep_write(r0, 0x0, 0x2d, &(0x7f0000000180)="9ae33c5fd8b0c0eac100b89d5246d4f3636253383b4b3e90230cdf0301cd07f86de78251c2ffff1f9d09000000") syz_usb_control_io$hid(r0, &(0x7f00000005c0)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x0, "a591e14d"}]}}, 0x0}, 0x0) [ 175.830608][T12190] befs: Unrecognized mount option "audit" or missing value [ 175.854887][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 175.867877][T12190] befs: (loop1): cannot parse mount options [ 175.876411][T12203] UDF-fs: Scanning with blocksize 512 failed [ 175.885105][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 175.893829][T12203] UDF-fs: Scanning with blocksize 1024 failed [ 175.902313][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 175.913839][T12203] UDF-fs: Scanning with blocksize 2048 failed 20:07:20 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 175.917184][T12213] kvm: vcpu 511: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 175.940579][ T8985] usb 3-1: device descriptor read/64, error 18 [ 175.987700][T12203] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 176.012136][T12203] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 176.021845][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 176.029508][T12203] UDF-fs: Scanning with blocksize 4096 failed [ 176.041178][T12203] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 176.055849][T12226] befs: Unrecognized mount option "audit" or missing value [ 176.063245][T12226] befs: (loop1): cannot parse mount options [ 176.153996][T12226] befs: Unrecognized mount option "audit" or missing value [ 176.160714][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 176.161272][T12226] befs: (loop1): cannot parse mount options [ 176.169701][T12203] UDF-fs: Scanning with blocksize 512 failed [ 176.192507][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 176.200410][T12203] UDF-fs: Scanning with blocksize 1024 failed [ 176.212247][ T8985] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 176.240504][T12050] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 176.249235][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 176.258163][T12203] UDF-fs: Scanning with blocksize 2048 failed [ 176.266414][T12203] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 176.277305][T12203] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 176.289040][T12203] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 176.297980][T12203] UDF-fs: Scanning with blocksize 4096 failed [ 176.306278][T12203] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 176.480553][ T8985] usb 3-1: device descriptor read/64, error 18 [ 176.510527][T12050] usb 6-1: device descriptor read/64, error 18 [ 176.870545][ T8985] usb 3-1: device descriptor read/64, error 18 [ 176.930513][T12050] usb 6-1: device descriptor read/64, error 18 [ 176.990563][ T8985] usb usb3-port1: attempt power cycle [ 177.200567][T12050] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 177.470537][T12050] usb 6-1: device descriptor read/64, error 18 [ 177.700693][ T8985] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 177.870969][ T8985] usb 3-1: device descriptor read/8, error -61 [ 177.901794][T12050] usb 6-1: device descriptor read/64, error 18 20:07:22 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000080)=@isdn={0x22, 0x40, 0x8, 0xff, 0x4}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="89550a8dd9332e2bd21aafca80933a6c97532e1d3783544228dc966c04946deee39d0c702884f25055ea2a840ad050d6db8e9830b225612fe14a68025fdc872b064c9edca420d9467df59e803741ca4bc72f", 0x52}], 0x1, &(0x7f0000000180)=[{0x1010, 0x11, 0x2, "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"}, {0xe8, 0x10a, 0x4, "97aed8ed893269f98f032f0b57715c961edef378c51ea6dbf8f81e0372564471608b64cfb61e16dcd25789cfb1a3f6259fb6c6bd897f0bca491c71bfdccae0881aedbe38878430a17bd361824b2689116a683be558df6773258e68d692fcfd50d1dbcb898fdc85130d0774b7ed9acbcd66e2274c1c7a6854350a786c7e12603af738882a768bd3437785ec5a4915a8281dc895c3cebe8a0529d1227218952ffa5dae566eab876eabd556df8cbb54ff3a3182f916f8509f0f2379d87ad884fc334d453e5d5c41e7cb7ee117305b9ffd04eb0fb11b9a"}, {0x40, 0x111, 0x2ce, "49377df272181346541085f81ac3be3c44ae7f0599ae570d6e67fd5acc7973ce15257dcb1b9b9fa321"}, {0xa0, 0x115, 0x70000000, "a860c37781ba27e2182e6ed3123381454bb2434083b906e944a3372a62e6cd4b6def3e0f7dae550ddcb06c3a0f234647794a4463843a123926c0f3e4c7d2116237b7a981d4d71c48b6a5ac5b70f2b340f3ebc53c90991e07917e36db03a8de8d7cffb37690c25cca43217fdbf1af6ef8177ec2881d41769dd15508bcfdccaba0551c0ca0bb66c4e95ed3"}, {0x100, 0x84, 0xa22, "f89b8a3e8ca9ccc4686e94e25ceb6e133a037b74c75d816719fe1f5df7f46e09c15f28e224a26a4338c2b87befe24af195f01bdb47a21c7bda8a69b612ac88a129f62d3d867904f8557a8128898499be475753a209f183acef6be9a8ae6a24cee2745861ab2c24cae3adb756114f817beb880c25ee320ae473b3cf512e78acd587fb25c245bba521b38d6512c6cc6d9221f8c8dc2cca8d82cb92b3a2b7ebdcb606e51f70a69b334529f02a4c1afa3213ffc35929ec74ca021dbaa81440a0b3ca950ed54b88536911b6b34930369c1cfeedbeaf9513ae5b32ad3f20f6d81647891953c22d49240d202ed4e25f4aa2"}, {0x40, 0x105, 0x1, "2eeb7ca61e0a23a1aa423e3bdf84ee19ae62c645cc8386157788780f5299b0407c550860afc3cd9560577ee3c9fd"}, {0x100, 0x10c, 0xfffffe00, "fc259c28579d81d861a30daadfb463aea5e170733feef31f99b1705ade10d47e9ce85bd0e48511cf8063ba0793d440a8f2b12d6b5b26c7f0e5dcfbaf632b3fb53f2c290d3bfa3e4db45afd5e339785a9a1b8ad31843b08fd27771ea1f50c04ee98da5902f931398680d58408b141a0fd618b84d8fceac8ed7f1c2ab9f1dc83b13a0c463e54586dac7fdd8432997eb2b1d88c099055aa7d7d2095fbc796e3c47ca95ebbd5ae5c69f68ab3efa3064291f5d9f8f97ca79f9d7d2f74866b5466cac0fd3d6d6a5599791845e385b544256e183b4d7c493465e594fe7bf5276c584fef9aabd2372f0d992702d6"}], 0x1418}}, {{&(0x7f00000015c0)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000001680)=[{&(0x7f0000001640)="7ff1721f97d982d7", 0x8}], 0x1, &(0x7f00000016c0)=[{0xa0, 0x102, 0x7fffffff, "3fa6faf247c8acba8e781c0ad1943e88cf0d0692474309366fd244fb5e53799a130a45b42038521af32b6cd1ce42974fb46f50339485594624e7d94b0470c25422dae2966c45fdb3ba3c97a5eef323b261f143d5280c0ea4bf10d3ffc0cbec3a427411df515774b26110056f435009944206530e30c867d3719bea41f89c6534e45d663111210110c4"}, {0x100, 0x100, 0x200, "040879cfab9842d04f920886c26503dc883cc17bbc562182c4fe0b6e21a4867c483a5340341a503d713a853b679970b29445c4c532401598b4077e9705af187e66ee0ef9d59e2fc0bc7a2e9b77ee15e3eee257c95d9ff265904c568cd2026e2d257ddd73e19538fb38eb9caf207ee2989a34f3b1a53ba9d814ef1f0fe9decc2075b32960ac8240ac7bd77cc3ae91f4acf6a5d07c3c56cb10d6dcf2aa65a3f6f59d8d5b7aa3ee39662e9915337d6db82d671d6ac6bcd7064339a7ac5148760aed0ac7d5145e494284a357d2584361b61416002e3e70812dddd19f6ad62acfe2c3d7684333c4ca0c021790b187f4"}, {0x30, 0x113, 0x618a, "741186746d0c604bc88e646dad29f3cb2c904d3c1b280c06a046ca"}, {0xd8, 0x108, 0x15, "c34251415fd3c364fb6df9a67d82661127d35d5ed44219f4ebc047aed8c50b01f243a3b772af1767b957240e3f6d28e46b2e8fd066c6a381f6d7f933c3c43f57d8e17d4d42f9a721413084cc7e15cdc3fa0ce768008d6202ac99ed8de83732144d38942af0edfe82075a5d662700855a4827dba1a9ac04cbc6166f81c924b98fccd352a2f859b7cd9c46bd601b34b21996da6b150ed040b0716e07f6d9183eb9780365963dd00cc2e7534b3abdd29ac5554e30681bd7c22b26df5ed6a9fa1e4d70"}, {0x60, 0x117, 0x1f, "99664421d728c844c39db43f91999b0a6679fef557a8f3b96bbf1b8b5cc4aa21b64a04bc6f6575492acdcb1773468a05241696f4b3406dbf71c123d347c084afdd58a702c008d645e93982c2bd9e"}, {0x110, 0x6, 0x1, "c71bc6b01202b890d0a23f5962bbfc4376a1b417c6d1a0b558ac08b83dfc0f4b0101d395389fd006f7b39062d40b48c74f20032e2738a571c7e73e13325e407d7df6d98078aac3a5f47d1a0d0976e48eee94531dc60b61662733663e058465b70710592a72450789a50d596e482b8e40b1908c7770a41146bcdc6091edea8f744c316b1e3e0e6e51bf2bd2d131175a3385c42502d0711497ae3fefd57153829f9fefc9ac574e7db65e4916171712d48da8716bff5ed9fcc7e8af99c28e8f552f622d64711697dcd4b213ca466b6195fe8141d479d59f484e7889a2481d267a8c49590b3c98a1235ba58eedc0c495044428b5f4e79e53c39b3f"}, {0x70, 0x11, 0x800, "56427c4dc3c2eacf9ae7cb5a16e1e56b409550339bcecfa69fd625507d41fbe101097d09d94d69d4a4f91d0dc54324d69772946bf3208a09528dafd877f4618dfc7abe66b3a786c20a234b7f6f3a7d37eb59da0dadd43e1c49"}, {0x40, 0x0, 0x8, "d104e71d0a5f71c848a40edff2d677b53eafabe63dde3bc7415b04ac9d73e07031734968764d1fd621c1889a"}], 0x4c8}}], 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000001c40)={0x7fff, "50a83483fa8fd378334687a63e4cd7156caa3c78591ea1b968a794e9da30c907", 0x2, 0x1}) 20:07:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:22 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:22 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:22 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1) r3 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r3, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x4) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000006c0)='U', 0x1, r4) keyctl$unlink(0x9, r4, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xff16) r5 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r5, 0x0) ioctl$VT_WAITACTIVE(r5, 0x5607) r6 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r6, 0xc0045004, &(0x7f0000000580)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r1, 0xc0245720, &(0x7f0000000040)={0x1}) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) 20:07:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:22 executing program 2: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000084c0), 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x1021d}, {&(0x7f00000004c0)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04000000", 0x6f, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {&(0x7f0000011800)="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", 0x15d, 0x101}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400", 0x65, 0x500560}, {&(0x7f0000000b00)="00000000000000000000000400000000000000000000000000000000a050000000000000000000000000000010000000000000000000000000000000000000346157d94d42dd69d800000000010000000000000000000000000000000000000000000004", 0x64, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000000680)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x20}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f00", 0xc2, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="000000000000000000000000000000000000060000000000000000000000000000000000510000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600", 0x63, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000000940)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e41}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {&(0x7f0000000140)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000000b80)="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", 0x1e9, 0x509f40}, {&(0x7f0000000080)="00000000000000000000000000000000000000000000000005", 0x19, 0x50afe0}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000000040)={[{@treelog='treelog'}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 178.018340][T12257] befs: Unrecognized mount option "audit" or missing value [ 178.033476][T12050] usb usb6-port1: attempt power cycle [ 178.041043][T12257] befs: (loop1): cannot parse mount options 20:07:22 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:22 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x45, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002000000d9343ada218141d8ba1b29cf6706181400000000", 0x80, 0x400}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000001c0000006a706700000000006769660000000000706e670000000000617669000000000064697678000000006d703400000000006d703300000000003367700000000000776d760000000000776d6100000000006d706567000000006d6b7600000000006d6f76000000000061737800000000006173660000000000776d78000000000073766900000000007776780000000000776d0000000000006d706700000000006d70650000000000726d0000000000006f676700000000006a70656700000000766964656f00000061706b0000000000736f000000000000636f6c6400000000646200"/288, 0x120, 0x860}, {&(0x7f0000010300)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xa80}, {&(0x7f0000010400)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0xb80}, {&(0x7f0000010500)="000000000100"/32, 0x20, 0xc80}, {&(0x7f0000010600)="00000000000100"/32, 0x20, 0xec0}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002000000d9343ada218141d8ba1b29cf6706181400000000", 0x80, 0x1400}, {&(0x7f0000010800)="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"/288, 0x120, 0x1860}, {&(0x7f0000010a00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0x1a80}, {&(0x7f0000010b00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 2018)\x00', 0xc0, 0x1b80}, {&(0x7f0000010c00)="000000000100"/32, 0x20, 0x1c80}, {&(0x7f0000010d00)="00000000000100"/32, 0x20, 0x1ec0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/192, 0xc0, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb0000030000000003000000003e00"/64, 0x40, 0x200fe0}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000000060000000000000800"/64, 0x40, 0x2011e0}, {&(0x7f0000011100)="000000000000000000000001000000000400"/32, 0x20, 0x201240}, {&(0x7f0000011200)="0000000000000000000000000000000000000000000000000014000000040078", 0x20, 0x201280}, {&(0x7f0000011300)="0000000000000015000000001400"/32, 0x20, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec00000000", 0x20, 0x201320}, {&(0x7f0000011500)="00000017000000020c6000"/32, 0x20, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000030000000000000300000000000008000000000000080000000001000800000000020000000000000000", 0x40, 0x2013e0}, {&(0x7f0000011700)="03000000000000030000000000000400"/32, 0x20, 0x202000}, {&(0x7f0000011800)="00008c00"/32, 0x20, 0x202e00}, {&(0x7f0000011900)="000000000000000000000000000000000000000000000000000000010000000005000000000000060000000000000700000000000008000000000000090000000000000800"/96, 0x60, 0x202fe0}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000000000000000000100000000", 0x20, 0x203fe0}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/224, 0xe0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {&(0x7f0000011d00)="d73cd47a09f7a5bb00"/32, 0x20, 0x3ff000}, {&(0x7f0000011e00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/96, 0x60, 0x3ff040}, {&(0x7f0000011f00)="d63cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5000000060000000100000007000000070000000a0000004000000040000000fc0f00"/192, 0xc0, 0x400000}, {&(0x7f0000012000)="000000000000000000000000000000000000000000000000000000006ff519720000030000000003000000003e00"/64, 0x40, 0x400fe0}, {&(0x7f0000012100)="000000000000000000000000000000000000000000000000000000060000000000000800"/64, 0x40, 0x4011e0}, {&(0x7f0000012200)="000000000000000000000001000000000400"/32, 0x20, 0x401240}, {&(0x7f0000012300)="0000000000000000000000000000000000000000000000000014000000040078", 0x20, 0x401280}, {&(0x7f0000012400)="0000000000000015000000001400"/32, 0x20, 0x4012e0}, {&(0x7f0000012500)="000000000000000000000000000000000000000000160000000510ec00000000", 0x20, 0x401320}, {&(0x7f0000012600)="00000017000000020c6000"/32, 0x20, 0x401380}, {&(0x7f0000012700)="00000000000000000000000000000000000000000000030000000000000300000000000008000000000000080000000001000800000000020000000000000000", 0x40, 0x4013e0}, {&(0x7f0000012800)="03000000000000030000000000000400"/32, 0x20, 0x402000}, {&(0x7f0000012900)='\x00\x00p\x00'/32, 0x20, 0x402e00}, {&(0x7f0000012a00)="000000000000000000000000000000000000000000000000000000010000000005000000000000060000000000000700000000000008000000000000090000000000000800"/96, 0x60, 0x402fe0}, {&(0x7f0000012b00)="0000000000000000000000000000000000000000000000000000000100000000", 0x20, 0x403fe0}, {&(0x7f0000012c00)="0000000000000000000000000000000000000000000000000000000100000000d63cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5000000060000000100000007000000070000000a0000004000000040000000fc0f00"/224, 0xe0, 0x404fe0}, {&(0x7f0000012d00)="000000000000000000000000000000000000000000000000000000006ff51972", 0x20, 0x405fe0}, {&(0x7f0000012e00)="d63cd47a6ff5197200"/32, 0x20, 0x5ff000}, {&(0x7f0000012f00)="0000000000000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/96, 0x60, 0x5ff040}, {&(0x7f0000013000)="0000000000000000000001000000010000000002000000010000000003000000013e00000004000000023e00000005000000003c00000006000000013c00000007000000023c00000008000000053c00000009000000043c0000000000000000", 0x60, 0xa00000}, {&(0x7f0000013100)="0000000000000000000001000000010000000002000000010000000003000000013e00000004000000023e00000005000000003c00000006000000013c00000007000000023c00000008000000033c00000009000000043c0000000000000000", 0x60, 0xc00000}, {&(0x7f0000013200)="ff0000000000000000000000000000000000000000000000000000000000000000000300000001000200000000030000000200024a8113ed040000000500028dcece4507000000050001baeed06f0800000005000153bfc55008000000050001120052230900000009000100"/128, 0x80, 0x3801000}, {&(0x7f0000013300)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\x00\x00\x00\x00\x00\x00\x00..\x00\x00\x00\x00\x00\x00file0\x00\x00\x00file1\x00\x00\x00file2\x00\x00\x00file3\x00\x00\x00file.cold\x00'/96, 0x60, 0x3801940}, {&(0x7f0000013400)="ed81000b0000000000000000010000001a04000000000000010000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f213156aebfaa000000000000000000000000040000000500000066696c653000"/128, 0x80, 0x3c00000}, {&(0x7f0000013500)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00'/1088, 0x440, 0x3c00160}, {&(0x7f0000013a00)="0000000000000000050000000500000001000000d33cd47a00000000013c0000ffa1000b0000000000000000010000002600000000000000010000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f21315a462280000000000000000000000000040000000500000066696c653100"/160, 0xa0, 0x3c00fe0}, {&(0x7f0000013b00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/tmp/syz-imagegen492932412/file0/file0\x00'/64, 0x40, 0x3c01160}, {&(0x7f0000013c00)="0000000000000000060000000600000001000000d33cd47a00000000023c0000ed81000b0000000000000000010000000a00000000000000010000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f2131913b9205000000000000000000000000030000000500000066696c653100"/160, 0xa0, 0x3c01fe0}, {&(0x7f0000013d00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallers\x00'/32, 0x20, 0x3c02160}, {&(0x7f0000013e00)="0000000000000000000000001120f5f20100000000000000000000000000000000000000010606007861747472317861747472310106060078617474723278617474723200"/96, 0x60, 0x3c02f00}, {&(0x7f0000013f00)="0000000000000000070000000700000001000000d33cd47a00000000033c0000", 0x20, 0x3c02fe0}, {&(0x7f0000014000)="ed81010b0000000000000000010000006400000000000000010000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f213165786a1c000000000000000000000000030000000900000066696c652e636f6c6400"/128, 0x80, 0x3c04000}, {&(0x7f0000014100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x3c04160}, {&(0x7f0000014200)="0000000000000000090000000900000001000000d33cd47a00000000053c0000ed8102010000000000000000020000002823000000000000040000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f2131936ca4c2000000000000000000000000030000000500000066696c653300"/160, 0xa0, 0x3c04fe0}, {&(0x7f0000014300)="02380000030000000238000003380000043800"/32, 0x20, 0x3c05160}, {&(0x7f0000014400)="0000000000000000080000000800000001000000d43cd47aaf634234063c0000", 0x20, 0x3c05fe0}, {&(0x7f0000014500)="ed4100005cf90100535f0100030000000010000000000000020000000000000014bc645f0000000014bc645f0000000014bc645f0000000000000000e01f2131e01f2131000000000100"/96, 0x60, 0x3e01000}, {&(0x7f0000014600)="0000000000000000013800"/32, 0x20, 0x3e01160}, {&(0x7f0000014700)="0000000000000000030000000300000000000000d33cd47a00000000023e0000ed410005000000000000000002000000a00d000000000000010000000000000014bc645f0000000014bc645f0000000014bc645f00000000e01f2131e01f2131e01f21314bb637fc000000000000000000100000030000000500000066696c653000"/160, 0xa0, 0x3e01fe0}, {&(0x7f0000014800)="0000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000400000001000200000000030000000200024a8113ed050000000500018dcece450600000005000700"/96, 0x60, 0x3e02160}, {&(0x7f0000014900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\x00\x00\x00\x00\x00\x00\x00..\x00\x00\x00\x00\x00\x00file0\x00\x00\x00file1\x00\x00\x00\x00\x00\x00\x00', 0x40, 0x3e02940}, {&(0x7f0000014a00)="0000000000000000040000000400000000000000d33cd47a00000000033e0000", 0x20, 0x3e02fe0}], 0x0, &(0x7f0000014b00)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}, {{&(0x7f0000000240)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private, @private}}}], 0x20}}], 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r4, &(0x7f0000000ea9)=""/407, 0x197) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000880)="d409ed0f052bd6c66669e71a25d90646d4e2feef3200d252546a9a5f4a78c0c108e8d76b5ceb95739d5f0d6ff921aa73c0e76bf48026e1ba3113789ee2d44bfbb746ab8e56abebb3fd38fd9ca77ac5b31e585819952f56e6c42485726056a7f51e3603aa2509e8cca2d221f86d24983da269e586946362569375c3bd2c90371d2b216804ab93141dae20632c44e0eab4a86ed9c1b767d0444a1c3287ec4bf8c86185371f8730f0e6f3fb7b6209059611aafdf10e18c9278398de1d990536ea72b29f9df5dae004e07f3d939d9ce44c58b51d", &(0x7f00000000c0)=@udp=r4, 0x2}, 0x20) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200400, 0x0) write$eventfd(r5, 0x0, 0x0) [ 178.083561][T12257] befs: Unrecognized mount option "audit" or missing value [ 178.090959][ T8985] usb 3-1: device descriptor read/8, error -71 [ 178.097199][T12257] befs: (loop1): cannot parse mount options [ 178.148499][T12274] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop2 scanned by syz-executor.2 (12274) [ 178.163754][T12276] F2FS-fs (loop3): Found nat_bits in checkpoint [ 178.182439][T12274] BTRFS error (device loop2): superblock checksum mismatch [ 178.199146][T12274] BTRFS error (device loop2): open_ctree failed [ 178.292143][T12276] F2FS-fs (loop3): Mounted with checkpoint version = 7ad43cd7 [ 178.760542][T12050] usb 6-1: new high-speed USB device number 9 using dummy_hcd 20:07:23 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:23 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0']) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', 0x0, 0x20e8820, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000080)={0xfffff000, 0x200, 0x9, 0x1, 0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) open(&(0x7f0000000340)='./bus/file0\x00', 0x0, 0x0) 20:07:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup, r2, 0xd}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket(0x10, 0x3, 0x71) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000140)="3900fe0700000000000700ff3f0800000045000e070000001419001a00", 0x1d}], 0x1) write$binfmt_misc(r6, &(0x7f00000001c0)=ANY=[@ANYRES64=r1], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x19c04, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 20:07:23 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x8003, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x0, 0x0, 0x7]}) r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x50, r0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x48) r1 = dup2(r0, r0) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000001c0)="0fe313ca66f25e37a2f2fb36a84e5bf3be7152af10d6db72fa147da5d24de44743b6ddc987f288a1d6e1d09007c33eb74f34f34d2774d488f799764e1dc870f76e67a7ef2a5c88c99c3d3c252b8b2b260de011047e47a3e900a676acf4e867cb1d4c2501046f686bf47cb5b2583b4b8152617d60b1bb1b7a1b", 0x79) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1) r2 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x1ef) [ 178.930562][T12050] usb 6-1: device descriptor read/8, error -71 20:07:23 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 178.978553][T12316] befs: Unrecognized mount option "audit" or missing value [ 178.986031][T12316] befs: (loop1): cannot parse mount options [ 179.052106][T12327] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 179.070669][T12316] befs: Unrecognized mount option "audit" or missing value [ 179.095324][T12316] befs: (loop1): cannot parse mount options 20:07:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x40000000001e, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)=0x2) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYRESOCT=r0, @ANYBLOB="8396a63b008c8f714cf329ee455f3d0000000039e4c2e96ea575fb5032299c906e3989d3461b78897ee50a85030085c79c3eb7c81ef2de41190bc7b1fb8231c900000000000000ffd40aa005b866b3f6107cf7d22e4dccd6ef9928c701e7d80c1413d3356cae6160ec475284cb210e3893dfe46a9d20e9a68fe943a8a439e6c5c6bd129c28b69f7ed4633cef99f2dce2e8062919db12395c8af9ffffffffffffff1c3454becf5b63766abd48e29dfd29fed0c453dc75987bcc5b0c74acd6bf34dd884f05bd9448b1a6096572d7dc48f76a5198d0759f65d4a608ab264a0c49ec1c971404000000637228c3fe89aadddd222133cae5020000000537d05d15d6953937ea44423002660675e2993fc2077b0350804bdb4c539abe6db402c26979ee8c322042b89e6d48c5c1eb354d17bdbc65a25b6b9c387dd2a9f119934d6b844fe1d6f293bbf1bdc9fa831f3b9b55ae73b206f4adba049a52d8d73157ab31963da4be1f2c07d45b2c4b9d7c8afa7052d103cd577815ac0e7680d1a07c28dee30ecaaf2cf3cf00de9068ae0ba14477aecd1e9276aa2ae9ce3d8ec1baae9d9f8455dca59cc83e2b95def81b349165c8ca842c8fc14f04ac9721a458d6830727b7aae1b277e5a14d225b3c56a1585131976640ef31bdcc57dd1e2e79c6429c9fe9150d643282e4da6c175af16126ab87dbecc8b41e38a856ed45f72a25bd88d78cae7644030f23d18fbbe7ed9307c259e3b51cb3999aed4201efaae598963b6408e3d2041ff27baad11ce43d9b693d017cdeffb5f4b362160f1970d6d74494f169d704dcb64c54b446244dd3d3fa2cc96ea2d826dba4d210dec9a21ef377a4cfcaf4b4d3a8f3762edaa70cf2a33be3774fa5d79a15711742cb382261225b5c33d84d2bcc27d2695ee884644a13ef41c47eddaa6941340bce88f807e9b198c6c0a7091d4e5b953705420d3264d2"], 0x80}, 0x1, 0x0, 0x0, 0x4805}, 0x4004) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x2000000000000001, 0xfffffffffffffffd, 0x4, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x9], 0x0, 0x290a46}) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f00000004c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x97f], 0x0, 0x10}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:07:23 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0']) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', 0x0, 0x20e8820, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000080)={0xfffff000, 0x200, 0x9, 0x1, 0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) open(&(0x7f0000000340)='./bus/file0\x00', 0x0, 0x0) 20:07:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x63, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x82000, 0x8) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0x3f) [ 179.105743][ T34] audit: type=1804 audit(1603570043.525:21): pid=12327 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir579671503/syzkaller.3B6etd/62/bus/file0" dev="overlay" ino=16067 res=1 errno=0 20:07:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:23 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 179.170611][T12050] usb 6-1: device descriptor read/8, error -71 20:07:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000540)='erofs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7765726469723d2e3a66696e1b48"]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x440, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20044800) rename(&(0x7f0000000440)='./file1\x00', &(0x7f0000000100)='./bus\x00') ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@loopback, 0x22}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000004c0), &(0x7f0000000500)=0x4) [ 179.218377][T12350] befs: Unrecognized mount option "audit" or missing value [ 179.227354][T12350] befs: (loop1): cannot parse mount options 20:07:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x0, 0x0, @descriptor="5d8b5f9e11f27cc7"}}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7, 0x43}, 0xd8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) 20:07:23 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 179.292365][T12350] befs: Unrecognized mount option "audit" or missing value [ 179.305277][T12350] befs: (loop1): cannot parse mount options [ 179.334342][T12369] overlayfs: failed to resolve 'finH': -2 20:07:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:23 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0']) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', 0x0, 0x20e8820, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000080)={0xfffff000, 0x200, 0x9, 0x1, 0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) open(&(0x7f0000000340)='./bus/file0\x00', 0x0, 0x0) 20:07:23 executing program 3: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="003f40000100d12677f19a02001c00108f13", 0x12, 0x400}, {0x0, 0x0, 0x9000}], 0x0, &(0x7f0000011600)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) [ 179.388716][T12377] overlayfs: failed to resolve './file1': -2 20:07:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 179.439507][T12377] overlayfs: failed to resolve './file1': -2 [ 179.439779][T12369] overlayfs: failed to resolve 'finH': -2 20:07:23 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x6335, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 20:07:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xb, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 179.486879][T12385] befs: Unrecognized mount option "audit" or missing value [ 179.504967][T12385] befs: (loop1): cannot parse mount options 20:07:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 179.557994][T12388] MINIX-fs: bad superblock or unable to read bitmaps 20:07:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 179.643333][T12403] befs: Unrecognized mount option "audit" or missing value [ 179.676046][T12403] befs: (loop1): cannot parse mount options 20:07:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0']) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./bus\x00', 0x0, 0x20e8820, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000080)={0xfffff000, 0x200, 0x9, 0x1, 0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) open(&(0x7f0000000340)='./bus/file0\x00', 0x0, 0x0) [ 179.692084][T12388] MINIX-fs: bad superblock or unable to read bitmaps 20:07:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 179.725610][T12412] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000002000010000000000000000000200000004000000005230d82c00130001000000"], 0x24}}, 0x11) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000004800)=[{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000180)="a249e28bd91e74f509fdef10864131e47bb4f737aa62166d784f1c172a643c316d3af81371920efd4b24be6d2f398618cdff1443b6c9ee12192c4667845b7ef86c91677d5365e9b2a5a63db6eb21d5e430cbae7cad0a85d7dfe84554aa9b94b578287fc3a43e988b6a33419feec30c5476cc19901a21f50c338b7a3bfe4fcd00a59135ed6dcc6199f336eea315caaf1b64734b", 0x93}, {&(0x7f0000000240)="2c297620e8d18bca1a79fe1824079cc72ec9403c9636e85dd2f540ff5443fe71d0539d2fad557ae40572af97a3acbc6124c48f967006bd19ee7ccb98481c84fac6d9c230eadf9b64047369293050e6f151d85808db6a52bc58edfa03c300e632c50c3589ed4e5a1129d3a5fda6b9e5888281d433ed012f5a8873df89e9fb123fa7c3fed0f7058f0effde920fbcd5b300ff63a474b3dd7f472a3b25e53ab3a2d35c972131510486a5d567dcd1a55e582dd8aab27a37fa0de1885d49f29b69f56104730f05ee57d5ec932b1c62ae48c70af22ba6649cce933dc4c4419d981dfec9093e3f0fd200c452d9cc497d9a9822950b0b3ad27ce8b13da3f2916f0c4b1fb8a7d971963fe3137ebe45af0118fa32fda00bc14d6594575f138eeda9e24214010c532036a3e1df9145e3ea9589f42e04b8a3b936ebae251611081eaee5f1a92321fd563f219848d25fc66043b67e775842b4feb30a4c4bed3eea959b9c86bef5c68eaf8e93271f66aae2a03385ea1dea36e420e5d64d3f429308d0c1dbf4d42e7ea71b3423753e686e6e3d7648c709bb553d79c4d587781e9a1b5134562aa4ef5eab4ffd462c935cc09172acca068fdd4808a5b0c08514b534c613cf10891ba1f24bcb4152cd8169752aa72c7d748769560e71fe16759906d00ee0149a59abdd786b7ac27bc733cf6f31ff3ab00aaf0dc75462fe7d02394b6ba6cb5dc0506111a82437813a01432f361084f9ed60b0096a4c80ae4c2a04e963ee115d7ec505b8d47ff306a11030ec158cb76c6c8780ac8c778762d592a5ece5bbaf0426a4152411ec2f3371e9fdf317b799549c53bd0abd153345e33763f7eec43aab6855a2a382b9d4e784961666673d03b9a2384decbe06cb45c57b84f15ceae1f476845cee3dd413ce3b503244b443a0736e9756f8f20e3e8c3ae18f2ce539068592cdc1d095186e64a470eb7c91034582843d1bf6c7b6b42a6898e9ec49ba9435acb13954ea7e9193fe1a973e88d9c4b988f6119e22c67fb842822709dc54b4902890b32f2c54de6904a58399e5621e9de94d59ab411ce02ea0fb0e5d0a951739ed52dd0ca4e885b40304a70eb3477871bc197d3abc5a9f6f7b47e3cb8c7f022062e2c1b57c7a526f06211798158051bfa645d0f7e37be390d5354ef5b0572950896b5089eacc875a6399e47eb82f39499c4839212f4cbfac1b2327a1e6a827a69fbb0b64e42eab7228f7b6213d9dc652a69b5343af43073a7bdcf62af454e6e6fbb63a5a40df3c6f26a40cc9d4467f6be9a5891492f60afe7c6167434cd2f1856518bb77f5484d5f2482b3eff3457cbd030a25048594cb78b0ef5e2a66279ee1094232e1857745485187ff94cee9ee1a1fca9b70390b6367e13e5d2b46599b9fad5c2490463dfaa22e81eb957719cbfd58314c096da619b3f07cc41db5379675c78e3db757901a265b3457cfee7c41e2407c3026144999453a18b9dbd5c71689fad8bb7085879cf23cfcb158f633ac8094ea4c17c3ee7968e4a028e7a7f694eb19522248625e3d5f570904be26af91da5a397817de4dcb055c9ce54f24848cfa99fe5ae14667cdf9ad5e525eb26aa114074fc576b165ddf79d2de019104efb4417ab5427c2a24aa94aacc90bb6abc0536d7c62c7d1c7421101cb91f285844ba50fffc99a01c12a7ce87a547efbe6268dd92323788d288e3096877aa2b32df1e513a6ada7be5a7b500fc756c5676ae1411a562ff1e851bc0ac3d6795b7eb0de659e7bb8d8444dd99eb81382116ee6cd0a360455169e84ca3584bdaed0cf7e9f5eca1a02e121db0abd24dcf85621fab91bb2e285056e0cba83be4420a08983b1ed937ad11ba5a5dc9860d15642b599819f7f0c76dd360440de7463058dacaac4d411481a796ca2577d0e68390d4ac5937e3972fd6365428cde5a66670e533ee97e2d37451cff6302cf0904ab98979df548131738163be6d64841902adfdeb58b04f6c80542f003d4e319b4c5f699610ea289e7a337a3a6331fde99a17963e0fb49bebd054d945822a5abe64a4921bfcee8ee4921f8e6c16d459f101c3a27228dc649e48708a7389bb6274ca8b8407a80978166e95debc594f72d05f24b194d50ddf754b070d125c0e3afd0a04ea2fe1cc70a28904bcf4f4c55ff2057cfe45f6c3222f17b4a5fece4eeb837ada1154c3ba368f01e8876ed54bbad82065f7dc0dbc25ee5c40b7cb4540c0abdd8ef8a789dd1b82eea0b26080dbed6bdfc9c9b50382ffba49cbd1b31a76e605ff97da778a71c065d52871f865648fad285ee44e03a5a0d762a54f47f69e712b135568b94202afb5e5e5a6699a93ce7c3df8060ae26f020ce88be9ed7d81345f2e920138a351fef42e0c9306a6cb984419c6dec2e4c28f4ac300595e1058b29e257c829f5bb568337d4e39b605d7e4291356fcdaeb968e7482a685fb4bb1ba4f26ecea5c93794160f5b396d843039e40866b8073bbe9742d58eacff356fdea3f611a8f7d9a0bd595a1c82371437c2af40c226d2eda42cc6d3c2920cf9cb35d0549e52b50bed4555466a0973ed1d7b7533da61cf07324f491697dde2f13e638303486ec95e01f6198dd6ad5c38be17e2841957a069de3c4d71072e59ffa7c6d159cf6b83685a6e3351ba3b42e5662b2c0f2fc9fb46d67136083f73622a437b24f228a7e8fdfced3d937b9961af02272c3352bfd93d82b3a4cd79030043310a0e3d059419e14da6fc97acbec3deb64c764b8095cad75e466809bb4d6c87e77a21bd4ee63280ac869af110954822bf5ff290f1aa061373e88dc854d4479d2f6682ed2acd0cc3f6cc801f5f664e36fdfcacced14c8430cd2d5c1b514b3d426849eda9ff001916dd477fe60d315333554d7745707489f2235f7b5fa7b1da59b9e2a8f98ae4e5a0d69375e7cca9547a3f6a46ed8fc67543d1372add4e11410fa445c81eec1adb4f9eb4b5337383a276e96c69754e61bb193cf84bcafea7d21d1c6ee883d2bb56bc30e864debcd67da555a7e62828b4caf09a7d60ae9b1a2826d41f63dab1451637ea3f625591b561b7e6f1fe2b51a667c4c05ad2029ef74db5bb0de50422dd38760f3ae18ed89f0c0d0108c70bdaa1e55210494a9954c8f06a4d17ac70c8280e71f464a4ba91dbd3c2cfe14da7ab93c76ddbbafcc5460415b209d21127e77d3f263d6f47ec22ba6ef1da162a626e8a7b33b3179b08defd3e264942ef95eee4d7ba50bd703de481b6a9fbec8b8a17ec2e663ed2f4afeba31259bf7e30cf0d9a6a4449a6974f43431137d8fc74de6858929e09bddb9f4f2c5d0f95e35cb4bc348facd7e8468516bc967248884d2ed6f35699e7e18a44e073b812558d637a1e453a5cd79552674c35bb09e0cbafaba9a5a9fae8f6bc2771c8d049db25fc857adec0b836f0c4cbb80f0745a149523d3b804c48873455fa3273a7a01a6af546991b0568bbd9e8a8b0fb300ccd9e92ff5cc34616b35cace8bd319eb4d4d26197765e093fc1439a05d496ae56967a26dc39c46fe4e32b6de32ef406173ef4d4764e9491c35b194d785ea7b318d9350663e7c0bac1d9e13cc0ef23fd9ffbe85330f7886bc8d9afae48c7a1dcf473c08e702bb9bc3501b8c72c8a51099d241caada704a6cdbecd9c4044534c5d2b8b10f227914addd2dd76feb248ae0409e5be99eab751b896b89dd3a059d635a0c42b22e0140655dda340397d154fefebc35324d2ff00a33e166c7977533a70e5fcdd2d4efa8385ebc52f5fa18268f75ec89c4398f8e46808d5dde89d0c5430fb421138b4bf02191ef60cd12dcf91eac8a6a673e5716d0ebfd3c67c97dd5ea900c83e044a75534416106a3e65082184c7ab52165bbb27f76ff173b68bf3bd7f35bbbfb894b414ea4bd22f2361ffcbd8275f954d72250fc59234681fe9890abed083c20261cb559511e2d1ceb6fab5d6e26bf3a29402037c9fcbb70155ffb30ffa8c2f32ed1dcda7c1224480310b70c290c1f305798392bb19aa57358085e13d97f72c3566d38b74895e99f0a085ae6cea4cad9f69fb93aea4d74c392a5927bba56c9bd582927a8cfa10791bb3843c4ac9dfbd7a113d8fab51a4a71e81987fef9eb47c049395e574806d516b33a888c668c909ce06e59ec820453a2383d295e687160672d92222d4f3d69fd2db52ed5d9f311d6cfc0db9cf97a35e6e4ce726c6634d8983e32aeb0b8cd8780473c35e73f1d70feff89e2b10cd6b36df01c0c8cf9172960ca0a65ad686dbc3ead318f85b219584076680bf9849581edaa4527425fccc83790586f98838d7940b3724030c657fd83b941211e142b07d6cce6a0b72a0db8be96ec8736ea26a9a32e47feaf05d109596a8cdb1c9cbfac291d9abf0ea2a432fb6a1b081d0fdc0788a14c0e7551ce54e812eafffc1361e361fdb2bb73c004ab2dc0b7597b14cc8a34b2b5a33277a3aaf9b4e094f0817e4f4f585d1438376d2b6c025acf0efb6ee176fc392325231695223093a5394422cad95be8ff5a45179cb216f41b371959743ec7c31e6afdc35bff13a2adac99d81aa403cb1989e11ba53fd7102538762d7dcdb739cd71289c6625c82f3ce2921e941ef67be343470df044eea7c2406e5fcbae8617ac817882dc63f05951e53bc54b450f73749f39d32de38c668a9de9e56394c9a464d3ccc933068fa6285a95c0f542bd895cd03d4a37412b0e76627f1bcfed264fffec32df2e1e79496bfd36026211636a1ef20bc0cc93a5abda7fd9beb2e3491a5841849cf80a1eba186141555d062131f8fb7e8eee7a04c744501a407dced1a90f2a99803ed46ee0ee2278d03d9f94aee6a2da3997d9ca91bb1102a6c7535f106a3e45579d82053b8681a8a1e13a7e5a4dfca595d9eb90694beecf2dc1d4e2b6cfceff0ff09351cf2f06858e1c06e4593fd9c1c681b4283a4b7d4da06ad6dd478fc527dcf24652b00bdb53c19f66e73f37c65c6f5caf5e268685e8673548597e0849d0d7a9d0b248934445c10104ecb07614f3d9ea0af51287a122a4c379fb3e484d924aaafda3670283171fcb47633c10ca08a56272393d57e0271d413d7ff3719ceead4936cb0dc083393388bf0a32dbf9045c3ff928def6d36af2410f43f3efd00c630143fcb0a45f155aab5d29715db70d4cd388628d539cefbb9511786162be537b11a7bc26e6597c21174ab571613937523fd5c0f517d94921746ce6935eeb74e4930165a5ad57d1afcfe5ed1f1e0de37753089e0d59955db02982878dcf9fcbf97decd68f655e4fb28fbe879d2990d3aa3db14aab4b44d30fc2cfbb888cb67c6bbf3694bd2bcdfb9defc334f17fc7325249f4a122bf074935389ba00a645adcf1928d430460caa7b241903059d94d616d8ac0c5ce80ad9db900c8c70a1a73d84fd8fdada3bf207a3d49c64414c729683789810dc9a079b195ec838130ad38676eca2aa1751fe9ffbc3c37b86337b9a9def137dd8e4e2ee205e10fd6b6b4547be1c02f527ac43199b6385182b89228a439478da9864e8d4578ee75018d452a814153632f8be7e95ce4fd539bd5329f098abd3cb6338965744b0f3d99b55e93196670b81e2cf34ddbab32d7d605856aac417839ac40258615839219004660a2a9db8171c3b76f9bebbbb74bb47f894d2db97482b41ae07f9fcd81606897c8c210127eac9138cec31410af577da22a67f014448ac74fce2d73c3f04fd39e30c41ed0d54e3027a368a82a6fb7f5ed0709f0b6dc22f68ef22ff8688623470028d85d5100db90f5d5053bbac0e52206e4db3a5a030138f8200cc0e414260dd4da", 0x1000}, {&(0x7f00000000c0)="7edc3219a4f33a50fbd3c2b8f609a8c31e295127fb0751350495b6c0ac089152afa47f71d394f0e409cebf4dcba82e65ebb642d91be7d65c2f348fcb0524734e36ebf5ac0965ac10bf51b111584dcfe3b38ca0876c0f069d217c46", 0x5b}, {&(0x7f0000000000)="4d52c1894a76b6c298fd0b197075ae63f0585f999715005e401dba76cac6d691", 0x20}], 0x4, &(0x7f0000001280)=[@op={0x18}], 0x18, 0x40050}, {0x0, 0x0, &(0x7f0000002340)=[{&(0x7f00000012c0)="81cd2fad163edcc93f6031a89a745ca1b61837d2c9d000154fe73fa1a91217e4887c96eadc8d9e4b8315aa3075a79fdc43a9de6ef2ab133c72d9745b8abd0118d2adf744c58cd2036ea3b2b15bed42e287270ec17090fb839a024a86db3aa915fe897c6dafbc6047fa9098be63c51ca9afa848188d9c0d414f501ffef120ed2972eb9bde2613d3fa3a50612eb1f2a2b992c635ef8f0e0e751b137573ff1f714df1add1d9d9c0a4f70763985901fa95241f23744957f56e5cfdd044b49625bafb999340815e4abfbc9a0e5402c0706ccb43d5dadf7ec61aff3e899f1899a498c87a0de2cf25ca2a44b088b2135c479a14796e3d2e5cef7bca153b2dfa38dfe4b2cf36e249d0877eaf42e0946fe600af4354d46805dfb64766877b176431ffe9a7b0f4b1ed315de9678508066b95f7edc21760539c70463ae0c3bcc2ea55fcbc236f5ca924cf9454efbee39c2bcb26a8bccf1e6177cd12ba8b77f057cd91da8c0f64e890a58a33a00d02469483549e4ebac555071e9816ad758c8458e78c9138e09aff7ce64852bbde179e8147a25ac8189829e189e530048ad65d46f020e0ea0b40b60d3517686b5f75f6a36a49055b2c0ed6cfd8bdb5fafefb089b917a0dba7a384530492446fbc9dad9035d588a600bf66d56f97867f282dac35f7cfdc7c2a1d0d88b9b8c86576daee30911ec2d957cd248cc2f9bcdf8903066ca8c2e431df744adfd08338162ca010031d9049e8cf57221e7f4a11d566263ce811bdbf5074d65d11b76760003992811c58d1af498e6b2c965279c944d42c61fa01c6cf3370b7d8d2a19720114e76437a6138a90dd7e042be706223d83d254a2e1b37f2a7d298affcb78b5a9dcf9eca899f141ee7b42279bba59768a48f0f541e83e956b82d7375c40e3ac3762308a36b5cd8f2c6d7b89786d6e925c8e2db78bfa0b04a3729ac5906ea616b734722d880fa2dd62c372334e787dc512eb0662bf7d7ea5f21a59b58a447f951efcf58e93c6ff5697b76a22815dbde531874b1afad8f57d45b3d2f6924b7c0d4c622dd23cf1116ea080556706c81ba99afb7280245709305d7b8629a321a6ef3fc5fff3c9c0cc86c4673d1ab9f755fda2dd5f9a45b5c7ffbf992589b3a3463e60d9f171b7d0418c47c14a2240b19a3c90ff4223c8295e32b3bc12f394998af1c6d8feca7932fc630608b079babb8708edcc2a239232dff36f43adb4e674b78ea1edc6b3e811c8b42f6ed1fef304ab2efd106475030dcbf12a952c37d989ebb760f1cef8fcad7d35832e99378af8b02ae61726ed4d200bca4c50ddd8339d3d03e64b4d1054b7c532ad6042b927073bb9d142ac638456a17d6972275ac3f402b16620ed4df742d11cf4ace0afbda8dc954293887ae77b53908f7852699e67a610a00f9ee99b427a4f455d4cfcd71c30ad11d7388b192c12f159abc10b743bdf8315fa7169238fa10f8b89895df97bdf5bea3dc1078e5a3bd9403ea0834a021b9bf96cb8389ea20d515fca9093dfad1cae31e2b4b4d134ce084ee99223aedb3d2094feae252dd9168cc7308f5bc0c43458ea5609649505613f81fd4c5e77c3ef086bb7ce2a546c367d7f64b5cf9cdb15d5e50450943404edbdbc7cd3a219697bac319739753b9027c0891148f59c01257f05a2b8ee98181a706c8eac2662a46ab23ece7c5e9461ab9ba8ca5508bf3abf7a87b9a0eff20837f0afd6eb42849fbde595cb2f55fc76978ff9ac9ac3151d6a8df956152f3535d73d9fcbe33cf0a15413f8731ebe2fb40a80fe0a01cbd70df9039ecec72ae4a6461ec1e023dc6a7d32e8e18405c19abb0975b5ccdf0f83f201f26f1b5d31e6a234932ae53f13a17811fd58dfcc54ce8db1d391ab6021e108e84c224586b310931f530431c022de5cba68105eb5f0a6e2a36e89a35098ebc985d81c077ed37d360a73074d5a327c66b3741ee94ad225618b26a7be170655cdc191e6ca5213df1b6bf516a5ed6972e31975aed67508657690357f069f1353b3a60cab73bb019f9ac3db7d9b05dd8f27f3ec58036d3121957c20791c0867e1e9ad587f68f10e9074541adf557f3c7d77c860684d6c8801bbbc665e80d5de472fcdbaf6f9403262c867c22525e3744d00d5ca7fc84f11ddb36a5b6c38036e34a1cb3b2a1e606bdf3a7f56d0dbe335681410e04fecde1be2a9d8f47e04994ae3a637042b8de78a173b3973e7dd27a30385a367135d695473b8be28400a95fcbc7d0e5390e05ab3d0211d404be314ff898718885cc12f21f58be265b0502e983f0f09cc4049e9cf1db9d4fd1a4bafc5d3cb4d9ad38d70a2621e4595fd90ab53ae5cc29eb1dff1d82d603bcc64474162087068bbfd9e03f0b6ed6dcabfa638cd178e914a58638b463c347fdf1e11294eef91d43a0a5a99e8dab5268a0b0cf7c5a1c47fdd436268033683d4fd1ec57b802ad0f218104d93457ac7f1d37f95251c17934cad64b8e2a18cef7979e33123ee48c2dbff52306f7bc38988f0d36d1b7f767280da6d37b6e72af724d6e9185f65129f540909a67df5cc8ad6272126e4a26f288f979aefdbd123199988ca6a461ee9a08ccdcf5ae3e400afca321f82a13cc06e129dbe298c9e894bf65ef42446859d109106c6af9f8968daa21b4b4daeec0c838bb75623ec13c83ca9a446d42c981672f7eb50450b848b272e89c9fa5b32b8d5bebcb630be574496b26f7b3da44cccbf591a7e7d34bf66df33cd77c569226af0bd8b0084521484d54071fc80c91729d1f7a2a90e533229e0a209836faa1518746af042892d171fe4292ed8653e732c55389ec78d358d65c2a97bbc36ccd04dec62d8e263617361e5bc08796cfe97ff3008fb84dac147171d24f87f824577a2eecf87730e310f158664058cd94baaa7695ed9dddb69d77ca6179df3f17f414fbff8d372fab50d6920a4b57da062611a3889f7e40778dd8ce080f808a0488d4eb75b83c70f8c45ad6871ef5703f7ee3c963892660d3a6951f4a66296f7937b26694cbb25271a7ec3e73173f72e8217011d64daa3353fcebda13028a9e01e103f4d76227938cf23bfc49a1667f09d5eb85b3cd11a1f85320f03bef27a103a60cadb13eafbd83004e184207eb18cc5f3aa8379194c2fa5479f663bf1c22a180826339e37ec93dd71ebfdddbd5432357de1650f3e7eb22b8f35657a27bf83b8edcfeff4e97db96662eda08e0ec3fd98d440b5a76077e6531760ceb07cafb13a1526917b615e0f21fe7b97fd420aa9d034097729d9e20cf60cc43c107011839eed6e2747a23b45dea05a51a336636e71aa1241d8082106402fd55bf4244aa2bc79f466e5eeb0c6a804cc065963292c8e90502ab7aeb3368b4fcf3558455d72836d60bd70a6c91cf4656175ca907bf65da51b7a735562a21de6099a0e5399dcd1f23f90b4fec97f0762e85629fb92efff08b1cb1a457c5c1ccfd389f6ba99082c5ecdcbf9fbfaa6be0e7e0661b217c095d8715be1d9999a6199df84a06bcc5f79d176363ad03d39426d84490b81c5efc22e7b1e1eef7cf71768981987a7b7af65ed529f22c66f3d096f26e8d4f66463cf85ad29097267b179cc41216d06d32d2003c5fe40a7e4c9fad8eda140acfc79c863e71e33256fb2414ade1ea080b2b4bfe8a974686b62102415f1ee6ae9d550f7cb42a6c50f2f70d3436204cd5f6c2f3fbe967419ba6b8379a11591636d90493abcaafd6269c8710ec022f0fed9e66fa3317f1fb22abce545a1d6343be51ea81c2ad6bf964e8133f4710b7813be81fa37ac65134ee55017af8607ae4f8bf3fb3deb2ac8889905415c9443694e329bdb7d4dbf0c4ee15509a2c93744794dbd90f669f4065d5f08351010022468f8aaaa3cbc41bd170601b319258010f7989a4e777aeeda10dd057c08ff0fb571b462e300017cf14098284b1bd72d3230ef97540e1d498f713ce6f46f1972e5db4f069fc39a60c013044b98b55b5161a01e929920cb863e188dd78a11993f289203d61582ef96865520b94c232c48bbdbf4b2e732a04eb9b2e61e8ea0597b6c15296c8e3ec7ba379043c895d3c1e4f112905d050380743dd490a0bf9ada70c50e131fca5f604d255fc079ea708a581f330982b6a4aca9a8f89537b3f20adde6a44d69bd968b511e61d29460d34fc3aeaf762df3a449ed3d1b70ec914784e2fbd29a2db074325210b73860ae46299a9dcc785e2a6ccd7776bb0218e05971ff908ad6c040fd572664ac277cfd9a7186cdb5e4ee07505736b4137aa91e9a22c08e6391746c41b60ba3d9da5d0ddff15638b004a461ecb1cd9636bdf5441bee6023ecc9f7c4b2dbe8438a6ce3a403ed1fd498f20f9c7735f5429aad9fad3194dff2cd6c7e0c6b9601c10e56c61af896e34aaa57f39944fd0db576d218d0b5bb46d06292a317d5853f717f212327fec6424f627a8d3c13ecf0c4a9f8f4416215e252f7e6bd7e08c87eb4e5b95a9a97887bb1710b8ce82e467e814ace73bb354ea8f89fe5be429f4e2111145ba55bc8e3f848cf799e6189d831162d904267a33553900e1ba56cb23bbe07f887f366335c16466963e3676c1f30b47a80aa6e6f691a9976b2e8025cebec2aa177e75d812fa53b76a87fdc6bd417bdb22e5a716fa5ea998c37de25b4b56a859a649259a4a1d10f1a578cb2586b7f933cdf1cb9a1235aa56b4cdf21aeacbe1c788cc7970e5333d971aa59ee2ea7e146a293a1f3b5051288cc429c4c58b9f20d499b61b8d3b1a5d78a68bbf5865a71129e14d2ce1a074b54ff0d3bf39bc1ee4e4e9e1e33a7e2ee77bffae7b2351e15b0ad6615924170ac1d9e691a51d674ad04c9f591aa9cb37783718a7fde4a8f079641bd436c34d6b10eb448210ed7c4cdd4a1041b97e87d0a84ed52cdf0e2ed07d3f732ea45b543500e723c07dc284310c25af5261628882766216c20a9ed2679939899468e41a3222559882e42c8ba449075f36a1af9c7884da2f9698caf0593e5bfd82ad9675f164989df651567bcf2788f468e2dc032549910ba2a836fa2f386f587f5d9de879da3aa480701e5aa7b36cb9d8e63e33cc0261ec9764cef2622791e906c21080ee4bdb031eb5745550b8e6d1f903c653bd3c76cba4aeca38f6e0687f2b9fbdb93400968fed5fcac91fd4bedfc21b2bf7140fb59a46e28a46857250c43e339220806db40b6bf9a8d1d62a01c910b18806144440fae069186ccb647b268a2c23f7ca645efef97ea744c5015ec08d83b0217215b66a8e1650be57943a6b9d4d1532e4e6c17906aa276215e87f51a59e80cf793b389ff781bc81908baba4e37882b0bda1f4cdfeb29726bdb5f4cf334de16bd559330e5705c89473b8f5ee8ae9f68a1c02833603b08dad016a8416433f3bd60a8e6c32740eeee99d32009d2ae326314c263b5b527ddbe2ea9ec0ee8ed2936f4cd06078eaf7420155ff5b6750bfdccfdd637d906ccd237dc51c4f006edee50ae4a5a652f0e562c5d12bebcc790ffe24fd460fe4be0fea20e14086b1a4b5e9cada35b61f5b12d672c243a2a09b5c3d61916ab4739c61dd46384d0b1d4dbf18d55e277859aa5ed416f630433be84c01e92e91087acfb5f4b79d9ffe313217574e55330adabe51d44e65fef29bfd7f2424d6c2169a29b7c26fa34c7e1c4ed7cb341a50d67fe439fc18bd20ced0bad9b59b914321da3504f8f761ed2af4bf9d43ca28e4baaccbd35b97a021d1c905f69b5c7cb09db51f44821571bdd937a7f961d7226ad7b01511ef6e1a40dda2baae8370d6f1a22cb046932fe5b2d1630e8d6ba8a7be3cfd65f1404", 0x1000}, {&(0x7f00000022c0)="8554772ecd581a268e36d0782e65a5d4e8219004c5554b793142927bd8cbc2109c1be0554e67f8d33acb4476121fd6a1054bf4513236e9e51a29cf4fa09695099061", 0x42}], 0x2, &(0x7f0000002380)=[@assoc={0x18, 0x117, 0x4, 0x101}], 0x18, 0x8080}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000023c0)="1292a870f1eb424dfdd123c4faeafbf25a56cbd2999fefb98061f19d0efd09b5efbc2f82a892ae42314ceb4b7296638249c6c5d7ca40e57e20400bc4fe0f85b91de6c42699d0bd232bef9df8242efc9dfd23e12335d71b46bdd03b510e3950e2e87e3b41b731820a8fef26f4cb6180d623", 0x71}, {&(0x7f0000002440)="b7002d9b9ac197684bd3c56bdf3d3ee5a4c740556999283414b7dfcbc1f81a9be6cd823bb8167c4db813e194aac7c2ba00d27fe0970d35b9338dec22ec4a0cff925abf6af504bc97c0f8a6857d7eda6d4b6d4bee730475cf0e9db6f74dbbfa7bba320fe63fe073b37d5765f49a9e9a41078e7e4a82a3f27d8a2a1eb34058db53dd17ac37d81a66e3b63996d6ce193b4091bc9295bbcda94e0d46924acc78c1b7c61d48550cba98b4c4dd39d05259a2abd03bae03c2eb7b3cfcabaaac10", 0xbd}, {&(0x7f0000002500)="b010bed37d5c55a10f48b07a2e91ff8bf59ea3694ed215e6b68b646731a2806914da4021285fae22b943c1e6ae85cfdd838050f545a1e35cc7831ea3139529215efc18e1fab9aefde70eafedf78cd44d3adefa62637c8585e5ff146b78473c81856553136256a4d6cf6d70f3fede9c6bea7643a10d67627621f4b670e0549480f0b94c82fdb49e9522e855b72cc89c0048b4b2da47887f3c2edd6bcd32f8802b8b424feffc4d301fb846ab25127086ffe4ed316b1355105c8a37e2e0d86a74fa560bc63f8d08f869ac578238dacf8eaccb0c7d520bc13bf6e87b8ee14f005cce", 0xe0}, {&(0x7f0000002600)="54a657e889a35bad8a1e0644062dd93c1ef711058c05f61423b56d8271fb71d2430d524c6f65e2e5fbf9b3baa87788f321c35514c23a0fdff1afa24f85413a957f0caff00acab7fc77fada13715457273df24c23a90cb5351b3d7957687c723ad056373ef159d0380e604218d1b30d3e492de50520944a91f8b3bd649e8d1f5d1ba26e4183946ab9", 0x88}, {&(0x7f00000026c0)="6ed55143897e02004fc905cc0b6e17df02d14206bd017148b970af71d79eee1b954bb173c3dc7123a969f7a3bf79e9de855401764f4c9bdff1ca0ff3", 0x3c}, {&(0x7f0000002700)="70de24f3cb98b889258144", 0xb}, {&(0x7f0000002740)="6d1d2c0c6dcc6728e98290a2c86f6ccc8c", 0x11}], 0x7, &(0x7f0000002800)=[@op={0x18}], 0x18, 0x40}, {0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000002840)="21078a767257c859fcef8f010b60296da83c0758fb581b27f7275a53fa451982fe393dbf7bfe6bc583e46bebaec150af8aff79bc55e700d0d79984952553d50697c023c0cc3b2938cbfbd1e5ad0bebe3e142d3d0504db5fdfe505d02c9f0bb91da8f9cac34f88b00e78646858875df2528a42a76fcbcd2743a9d047d485f1123c9e171e1bca58387146945c5bf8ab3485a3d3189acedb755f80ff9d2ead4d1a682b09164b1deb122080cc6b2b9f3e6bd855293fb02a254a581f3ce15ea34173cf447ca54bd961f219078a691b706", 0xce}, {&(0x7f0000002940)="33fcd8b2c92164d6c9245fc19247f1638946defa0f2dfb51b1478b0f4bba98f7e410093551e406c3bd26dcace03c1b152e1958e912eb58e4144c50a53620e717d5b964befbd60587d95a5c3404e055f9ea8bf75449883adf3dd27f656bcc1867ec6aa9d3d10ec750bbc64bc318364b0596c6b8495ddf697c2e1cbc6ff4e281d1a33d75cb8d7620214789b235ae67baa04bca2876a8353fa15afde720d034c2beb4cbbba345fe1705dd9a693bf5f751209a776e834e0841da1c82ff76fc19b99b", 0xc0}, {&(0x7f0000002a00)="a411ba46c22448367562da398994d2b0965bddc220af0b71ccc4e843fad9d8cf57fd015a2fbd41e2ef334a4f39f78c63513ae046fe522cdd752d4de9ef02861382a39b40b5db0a9f45746a5db9df90177b210aa5f9418256b1fe001d43a613c5e1fa5ff6001dbcb5a2ef4d8cdafda1117a7e0b55b63595c5cac77688cd88f2f5c90dbb554f88d3c63a84bc74e88d2506009dec", 0x93}, {&(0x7f0000002ac0)="23a667a5e20448c582448079cacd11774f3f9d917739e5cf14542b6473d736bc8753f45f3dac18db8124060c1f0c6115a88a3f55c304885c1aafcc94e6730fb04895125e1b10f6a7a3c68191cf2d66fbadf82d3a5233fbfc7447b90e0b81fc70c8482b8ca582519a56cc55841edfda5eb1a8534b03b079be12a1ce", 0x7b}, {&(0x7f0000002b40)="419309f6416046bb7b5d6523fe4c58dc127db2d5618855c3d297850cc8e2fee9e07543ca57cf5873f4636d881f23ae1be303cf753c875116ca61e342b9062bb0a9faa0c929f9bcc59aea693c04337602b4f2136d2b82a583cdd50bc4a3921d6703c7cf76a889acd2de6df8a4b3cf238c48854b7ff9e2046bcf97ddb08be92e4ccdf51a8bccf9", 0x86}, {&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000003c00)="c10e054c83c23c0336081bc90a945db0bccb3e54f560d29de99f3ae8e55d2ea1e6e7b8ac629fc146f4645bac415060aaca056cf98b1433b590b8a27d9c8376ea8b", 0x41}, {&(0x7f0000003c80)="f0eb0ed32025fff92648b2d90132bed35ac134a4b8d4cfbf2a56914457077262328d1dab6e54312d0be7bde9af99882dec1bb652cf67cdd7ed218a86d5d32c24e2281c1e8951882b9a5c59d688f5b9f5538cea9ee674745b4d93e935d7fd297b696137da96dcd512b57b7c5edb8ed9ed456f3811da8da5fae6c4d9a5caa1d0aabc20bddc29172ccf11570efa894e97490c1c6375e5b2debba499d8d791fbd4b3890cd6e349604187b151154415aa96a5488f118b75319ede15c5e316", 0xbc}, {&(0x7f0000003d40)="cf126feb5981ff51eeb3a7cdef68d1fa7f3cc7c7e888864b8de07f05f2efa839bcc9aeb6b2b38f206e99b452032b8b7820baf1174c69accb02ba1abd6e53c16b521d987c1e7979c3c6087d2385dc27253e74fd1b63e3cc7ddc843b0a7530ce13a9c8e6d0b28f708e91268044abfdc76f6855b7a7a7f3df9af869549480faab377ac1d07f8f3f7426c9e9f69ba51e5ea52f20940e7f1237b348f06f824f89aa9f84e26ec7148c994280a781688c8e91a005ec1bda236abc36eba96684731aa6be6857eb094291020b341377ecefe1cd27c23c3ed79f1c456fc791fa0f24", 0xdd}, {&(0x7f0000003e40)="ba59e4cd4fcddb603c5cdb99631b29dc2f05431b1c171e95ffb6a2dff983e809b9e6e1bc6e9d988f35bfb7c9ba032889005ba80c39c74dcfb84d6a35ba3cb1f4228672e37786f456ccc4730c68b517d64eac3e78bfb6dcbe00204a3a9325d0bc7100c4836b8b2aaa18b4e215d21fb1016a4f2a90e874738d5538e0bfe593e174a900b101516bff958771", 0x8a}], 0xa, &(0x7f0000003fc0)=[@assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}, @iv={0x108, 0x117, 0x2, 0xef, "55222b92b574d10817fe9c0c4f8cdb49cafe5e8567a4c28ef4850f47e2f2c34c60e1276d031b961b2e682ea51130d991a3498382477efa4616137fe85c596dd739c6c09400f4d29209c649779cea42d3674f330da3d3ab840e3dd9aa5fdaf8559dfec1c30ef10aeb585c61f0a5710a24ebd09819b41cde464383b3c34137adcf4610706145a446913c1db1f8ec314b7a3300bb885dd64f281ef297fc429275fa985d935cd4d2462119843550f41ce00f5b64be09d3fa013eeae8c82a65affb659c4b9e6389cb605a8222c220f7637052358e503dbc7504011150f89c2909bfde98f861f4fd8014da3a8311e7c66241"}, @iv={0xe8, 0x117, 0x2, 0xd0, "28b68d61b171c79989d8b78c750776d4da6f792cebb6c14e374a7238f22841584db70ad62ec31f646748d75246f606395120f0b9c15b0a13fe890aa8fb406fe6be4f93418f9436924bfb23eeb5159c187a5195f147e116c9a3ef76ee7fee1be4c3880369498a3ab1ba281195549668e74ade441d947b049d7d4dd028c4eff0431c20693e129ff9d86f98a3ed6279a63b5a43b939fe4d0e57104c06c1de2f38d29e02014b91616c5f886e2fd7dab1fea71b6146c52d3b3260849a0776a5ede6883f6084970f85f9b8a17bc0bbaedb1e80"}, @iv={0xa8, 0x117, 0x2, 0x93, "8d53e50b39b5a38aa10cd6fe0066c740b9d0a3769f39e1b5f71a12322f123947765be5be80ee912c5ec877a753fc897efedcbce6744a5eb77eafab32c00cd9aab0e723543f207e2e8450e913df89f146c8d82a2f8004140873583c63d57e1e737cd7f3468bef92f2f007280bd95803215a09ebebf288721660e1dbff5479a0c33c42419588fe4b90aa5f96006358e9749efbe2"}], 0x2c8, 0x40080}, {0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f00000042c0)="716188d6bd0ab4edde1e95c66cb18207ac890014e45f40937425d017b0203bff594107287d80c97d7f05c32abea1c1b37f15608d406ca5739818f5f8679ff6d4de9b27b5d6245971ab410031b4be35f14a3b780b0be37400cc43eba74b4e528e8368e15aa946edcae099abb799140172d49768befcf6db377152e66f61ac6c864a0cc12897251200714e13edb76f0f979e79d7557c3124a25961d43bafd15cc41ff5411cc53f7b988e0b10f0c9dfd4abeed20c1c69852e29e9ed34b24213bca6235b4df1a1fc7879c58ecbb3133a93777de8443f28", 0xd5}, {&(0x7f00000043c0)="ce9f216dcd56833634446efcda4ed5575de6ab280b070174ad09da1f60b6d806b2d66adad2d2166054bd309d1b8ea63a131f2d5efe81502b9891c5f01f955cfae3e557e7e75c6b4462b69cff9def083bd4e30b8f674361cb9390d35323a06f7e921c1d3d7c5393089496de037cb65a2562b4fcb9816a09405e184ce1dde8baad0813284b10f9dcc96c4ed8f659db0b39efbc8608c7b48c642d7d4050f34d34504486d505fa524d00bfe2ee790b03b7b966a9", 0xb2}, {&(0x7f0000004480)="62f7fde7b66c4997c7fdecb270f52e4ffe353cd2d1da5bef84a8ca8f3fe9149c33696c4918aee29885fa2a73ac8c6fd65d6d2791f90bc1c0f3263affe8ed9b7982cc8d4a99fa86d257f3928bf7bddded5bb0ef5d3b6933d15578642976f31ef64b5460f31bb8b95b92cd850390a6b701b5", 0x71}, {&(0x7f0000004500)="0249fa9d8f3a29f0c6b5f3cc199aee8b833d35b12301ff7677f4ab7c72fd271fdf1cb58312856423efbeb0eb09b774304da92471b34fe917d437852f2a80a30c2919d19eb44bcf14937f7627f1f18febfa67fa70c4a138fa72fb72337d3f7ba2e7ef0aeb92d598cb9eda95fc930088526d62bd559a6f805ec0d4362803b4e5a534a5bed1bdcbb35507b193a7bc06cd161f702ee5b07750d1", 0x98}, {&(0x7f00000045c0)="256836d5980f6b426ef039a92eb3a2a9ed84f07f784bdde63f6484740d7be63562efc1ecd42b7358288550dbc41e642683d8cf42bffab808b89b2a978de6584f48e60916990bc292ace55765e09fe5754dfcf24f683591e664f5f7d1c5feb2a2f05310745634377df9d72a5b9013807097d561a6bba51eb280ccb823162478f80789c0be4ad875de31299dc7", 0x8c}, {&(0x7f0000004680)="08e610ea7b10631f45ce1ec45404455c8b076e3fecb99f4a8472470badd0c3fc428d319f2eade748798776", 0x2b}], 0x6, &(0x7f0000004940)=[@iv={0x108, 0x117, 0x2, 0xee, "54ef69147c66a55cd5946299245f78d1d88e24ad73c40b70559141b36ccab23fe4f0cc0655595aa9d10ad6d5cd34748239c5204390816a0dbf8710af134fd559bf5a8d0517cf03f4019d081d8357cd04fdf3a0c767dea6a607b80c04c0f17ad3160a58455e483524bc29bf4b1f186396ff47b67996f09a4783eecbf76353d75bcf32077159a61640cc0f3d777bfdf8451b3830f6e1e609c19fabc35b73396be42bdcc98a5148a68a16752c4cd24e6df1abc7b7291d5b2025adb1a93dd371caa9dd07b0e913deb4fc48ed179bee7e66fa2edb728e4a267daa1050f14fe96c1fd9cab095cbef94b18778d04cff4148"}, @iv={0x60, 0x117, 0x2, 0x4c, "1b97828917feb55827d1faf483a8d80c67d80e9f488db97e2386c1f168d7623fef6c00ac5ed64363694f3b7a8ace48757987c95e403b5ecf73452ee73ac59b63f523ece540d6d904ce1523f7"}, @op={0x18, 0x117, 0x3, 0x1}], 0x180, 0x24000054}], 0x5, 0x0) 20:07:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000500)={'wlan0\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="0c00238005009d0000001ce3743b5ca95b9a27780000f9454cd3d1ff181380f15b8bb2d2b74bad64c9cf2b3c6ad1f2ec92d388ccbda6926fa2616b33e88b129db2b06c3a25a81cad0b1a7eb73deffb66cf1a3f532163f21ad7fac1f9a7b9dd2b9daf8f71ae0ebd8dd6dccd2401bb94f4f29f8e42b0481f"], 0x28}}, 0x20004080) 20:07:24 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 179.842707][T12403] befs: Unrecognized mount option "audit" or missing value [ 179.856655][T12403] befs: (loop1): cannot parse mount options 20:07:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xc, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:24 executing program 3: clone(0x632a8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:07:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="20087cddefd8030800000000a903fb7f0000000000000000080001e80ffb51997060e8ed"], 0x20}}, 0x0) sendmsg$AUDIT_USER_TTY(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000001700)={0x1010, 0x464, 0x1, 0x70bd27, 0x25dfdbff, "78a1f1fc5f4fb657260cf6cb4fa75bb320b71a51c48cd316e77fc74fd6bbb2588c8e9295b02993481d446d551c59fb5840fe34e09daf6076d65f20e04dc0e546817e29e9bb411dd73ae1700413a29f23a7da8159f867a3c53f454c009ad3d708bb942cd961f21a5ef50d689a095bc47ac091ec1fdba4f0c00f5a570fa8979e98f38e879cd4bdf1201cdc1e663aa836cf5bf857efc6e6e3e22603ea0eb24e00b2f6faf1fe783d74c847e38b7de3ee67914172b9451909661558a2a0f58941ce0f675f63893a023b985ab4749e338e6e4bbb182d0a9c7e85053a39366aeb882ebee7854ec2f88e12fbf9c2f04bf52a17b3f8799a63b65d9762eb810eaa86a8aa935f9720fb057db28229dd4a63c0cb208802debdcdf22d95be337a1063586a2c4aa8c3029ee75e726207193316a57c0e2815e3a6d8996aa4eb4cf93014f46e2aa1f1e09ddb74123bd794339aab889c5b565d88049b95560d1101ad9781fc3192a07d6b7a258b21cbc705d2080dd90bd73c4a7d6ea998e3fd7a64a882c0875a0bd7ec045170dfd4d8fb7117146045fbbbf873158df0d715b75f24ede0e3d68c580e80b4c2fa10007e0b202ab95ee51de0ad10daba0be73d6c606e75176a776b1096f179acb7020b23365ed95a47a4748a6747880196b153c3781b5fda2a33badaadb2a693cad9db8249f5d901e104fe7fa52a509066e96d5f7d7b7c7adafd81a03d342e5f7a4d120ae0b0f3b0bfa668123344ba789abc941f9866fa131f69efabbed9d5c6cdc844c6061e1c6742cad606fda852daffc4fa229884c397916efbcf13750fb18a02d4b933eb952b97727e1a87471b8fecfe70fa67fe4473f3087b0dd4f74e8563ea4cad331df778e72957e5b25898bc3eb25e38b347cc21dec98b6364cadd121fd22b2b1bbed2fd9e1a82b34cd620e5ef1f404aae5a91f762202b413c779dff4932f4edf24095f1f48676b000e8020dba61b4c5be516c2b5331bc259c423cb41cfe029c616dd70f21c63ce5d028dd99875cf2cb3391b6e902df420d7ef5cf24d653a374e0543ac614d36a8a35a5099559b1bdbda94ce0e8b42f04b1759f1c4f09a45e36a76007fa5ec96412e2b0ed747984b327628251e93a0074787a93a843b29cf72d794cda9946aed83b67d706e0634b4e4a0040558753cbf995ee82f714d28dd6f61c5a750f8cbc85afc78c107368e89a37a5b5f93fb1401d127a1f68179569b0f3234549a734bf29030fb3b51b7891800ae1ad2d5bd15255a18d765b37a39c24c13fcc7ae3c75bd7b3794871b6ac8977167814efe6f20d4424a42c73fc59015b18dfe2f53d7ffe7b819ec57b3894a03f05ee9fd816ee2618172e6c632898dc2c7bcb91597a045e09f96f1ab1e64c00fc7c0009f098977bd213d1d5794e795c34ee3c4aa6162efe9a3a809383c0fcec0a0298cd351e9da12c780ae96804a65a30c8ded3063ecdd10fb2c1505a28374710bea51c787271c9d9fa035b5ca57784a8ea863cdd988daf8adcc002943ef5065f6f49d92604cc018886ee0d6ad1ba3fce973fda41368b524a9fc03f135dfe40ed547298d54f0c0e5dc2e3f6eb8ac07af27ae79966b8e619525156349702d32a8949591e596811236ae7dce57a82e4bd588729fd157026a758524ae0505afb9dbfbd4503640c51c32aeb2989f9fbb98043ab010d4086597027cc6cbfbc5ffacafcc3162355e945fa0c5079ec4bdf23e04d7222e617c03f460bcb6fc628a2daf714e0c398b237438fc26ec44d2dd1b8772c173bd3068fb21a2e1ee9f2bb696eb9a7e349ce420836593fd6b21e92cdf2f1d9fc432dbf29a413522d610df723655a20ef1a4afe59708af7abf5fe04772739e3712c7d2b9939aeafaa23e1f4e4016a50db7c3c25e077d0bc08d18f276b91987a40c4839f3bd8378cbe2cf7a3c48278fc77e41fc3f6659003c03edd8e1c015c7695b57993341870203f72d06b650f74a254fd3882a0b85b92cce4ff784a9fcb57029534b7a016ea5fd2bfe2c5ddce320759c77f84683c1f3d47d541f523e8d293db18ba12f1c8d672f27739fc62e453b8e860fb4df1c67783a2ebd5d751c9abbd1f085fcb8aa86efe1b032f08c371a3eb2e1f5041e81295e89941cafecb3fffb853ac3e7b7a931b433bb63503d95a2f8ea42c2ab9f89cf73fd24a5cef156ac9d186c63f0bc107b2dbde9c2e56266d31f6c79b1c44ae4fbd2a8099c43590ff92d6eb8073c402b87a8466c5a6e4507723b6e47a1c15c3150bc181809d2f6e4036588d26225353de110b3d9c545023579b9b120ef9a13cdc04af97a894fc491fb241da4aea5e90c77542c5109905c563121a1cb12dec05fef26b249bcf76e2e9b75e2990dad1104f433752cf793d6d51ff3ba0dcbc3984a29f714de02ab4801d9cca463308b510ba87befd86e89ef363d6270674ed0a1eff269956e863c4bcddd6cea082c7b4330b19c8d9d683d8aa7b52f5163e62c8ddad1356da007db1ec81c92a142c35c167906be732799225fa69febcfe57114acc3dbd066dc4b031bc5a9eda90b26cb11269c4c3ab9206bceadf668ce8a91c2851bc130254cbe70d7907baa419aeb3dc83f45b899947c16610871372998333ab08927be848b4f2779dc8a33bf1b780abc8dd4329ab743b069d27e71aa15c682b89ad1ee8bd5b2e2242143098df40ce22464f2e3110a49fb761a33fa15b254844ce1bbe2137c414102dff47834799ddc725b3ad9c8e0590b3774d3a93db66b6bb49e00c4c08e2f6e4cf06cb3fff247bf711bb2e5d9d4583ef36f81913ae65f6ff1ba0be47fdda1504a04fd96bdc7f0721238f20650c2654c8d3307f2bccd904686c8e9de6add84fce7776d2558b4bf502dec80de615bdc65b801f8822f193b19dfd87cdb2bc736eb50eccfdd9d4b8690313a3afaf7ea6c112151012873b8cff5d7789ec66af81695886959c86954875a6d1bfba2f0683d3ab7f1df2e9c46aef9bef18ddf4cb64458da50f40671fd8ffad3e24d5b69e7eb7ccd2cd5748681b707948bf1c16740863507067f96de0e1672a323c89fc84ebb2558f740bf834fb847c720479afcad5d930b6f37a2a21ceea4bfd48a025e7dea9658851b52bfd63afa1dc30742e1c2b35fef4aea5c7b9fdb90a995aec4ae85d321a3c6ba1de4df8c5b7d4156bc5053141cc0ee939f45e99c387c791e2845897e0db68b26af61d096b0c1f15fa4400dc9c37b28a8fa9bca6aa15b8b0c5efb52616bc1f77b1733147847aa47e395ac6407146781ce9ce56fa49c1588545ca39a5126118e4f4034ec2c38803393d0598e16b7defebdfb309024033699152c63d335914d3d98bb3c4f7105354e51695308335c02c49470616f92c572c5a000f6d5d8a40f7a4cc3ebe3122cbeafc2a427b4faf742771a7e7fad4cc83e20d83c8a97bc44d2fd7f3e117fd09b8e7463fdec76cf92c5d4a1825a6e7d70871cd8d13f78b3ce9b7ca6614ae557af2dd7830e8dada56462d2c8ca6e27e0f777e205a20a25832d325dbc94723222942b8b743a9a5177f752f6c03801f1b1a0c0703477c69a4e9a2704d8a9419a7de92a385b21a486da70ddaaf35b18ffbd090bfcdb1894a908f1484ed1d6b0f7261f3f6c4fcced2ab0be6c3ebb6b097ad3f9535d2dbd6a0492fa83e923098344df9646117cc43a54ea9b2b1f250d08355e4e617239f492cecaa3eae6f17ab8c0e6aadc20677ff9f8d01d18aa62e16febaf9ef1b61cb2b53f6deb6dfb46b399ac7972adef90dbd83dc13980cf47da1f72834366f9aaba8e93c61c5853af8e374fa32440dcf74324913d34ae3cc5e88298da3db78a17645629a17784a4f33dc909683c7214ec159783d19e1f9f73185ecad02b816b32fcf6792a728138474f4c253f857369b36ce2806a8a33a1e49aa288b4d5c7f41b3c895586d0fe93a65377ca4988c1081b3115143d4a096ea78ac6303f2dcdb43ab9af9f1d2305e8fdb33153f9cadc134fcceb5808e83c329b5d769c87cfb4ee20ee42c04c6475164c904a85d6514aba197e008e1153d9178868f32f8d4c0f6449b25da852912641be86ed9ee6204fb1167a026c9235dc93e18d3523623225d88f62c26b54a21483c19605d83349e6d54bc916bc53d57d3c883c234e489efaf24c44662953e2b7d00f8cc64bab0376fad9f448a55ba51b164ed02e6b42d9bd56095b166a327a6236e7f237f3ae0f7c08e37a6c9985a44c192564ad5bcedaf21225e2fb7027d1085c636f0b60e79ecb441f6ab1f1706ce9abb6c6ec98ed6db65ba64e049ec53d87a2eff61a7324434a3be1f7a348e85ca5902600c1f54ac09599e95aa9d8d2c8c6afdfe2601ddf6d0550b2c85744f38005ceb36beb224b61bcd1b549f26e753b45f8c71d9fa920b35b2928cb4fcab7af5b455e5e920c3696c18f21d0185f184868a1c0ca037108b7846a95fe392829303c29acd7869aa7f22d2ad9bb230b5dea84ae7a92846b32a19e75956c8d8319b0d0cffecb10e9d186a71482b5cda9a6d7ce90360b80f2e49eb067c676a940c47ef1eced17c2149a1c75a0ef7cc31359369c1c80f79105161f0a24d5f343f6874b24d52847edd7929fb598cba8a9da84e3af92dcbf0126de7cca82edfe10bca9a8a0503682d18eb44e98660eae0e780dc8c08929fe068fcd2e4aad9ecaef31d3736a4d9b729ee4a0dbdd6190481154c07cf198ddff1a3a21bce581bf80de8b66f26849b82ead404960d8384db93181c784c84d0e0f811ab7cedb604ea7ca5cf8a8ed3a936996448ee8a76665a210c69bb64301a8d618db9507aeecb036f445a911b7003c870a329ed66bbf24358d564b3f1939ecee2b706584156ce7c5032bf39a1d100bf12f0c2af79fcf63e82cd9e78ed72d604950f73b2c40b0929333df0d8fff4709393b1e4ef3f2fa1a142efbe1fac0b063cab6b844d9cd9c2ae1d9554935da7da9b62af3474bf78987a86ea8989bcef67b3e20112189750151d2650dbff21027df000d59b5c96f06d74427649f5178bfecfcce8c822b49626a47535a2d28df0f59485959698a8443f8b53511bc35ba424fc3764ce42ce4b0dc0cd1a7090c9616fd7b4ad91513cf0b64aaf0f65c7f5edba8c39f94ef04b4e7a2ffaaa1eea1208f13fa986e886e1a71be43369f8a705bdd30adecca97c914996e18eb0923314669026acb539c3aa198376a1fc71e6fb186f2aca4e9afa4272e878b8a80e640fddc95c81076e21255cab6da3378674992e43d9b9a5fbf7620b88aa3a2e47942d4257bf255979e0cab6290aae25c276621b0110caa43c5c35e88f8533c583c2e147d87ea655eaa61f4a7475dfd274fcde445102e115da4d5b18cf6052b7859696bcdc18c1801a7c89e07c71f8c1be57e9256336ff2e1e86631258d7094ebe3913e55c7af115898f7dc38df3d5aac80b9355006ea5d6f7863af5a474cabbc6ce11ae29a3dab18eca9b5b06985d7568aa8af72d60e921945dfa6bd0985679a9efccf855e8a4243e3777ab385a177b87aaf3a5a7d2a8a659cc30bb94c9d851a12f4cde74fcf829da6652ab4d18f7dbb7614da24582ca4ed0081bc511905e576c986b979b5afecee4a77ec64d7b90d4215be9e0bdc16d2c845bd82a46271372c214474264dd3d0194866ec865aab7a4e9abc447cfb94cdeaaf3ce96ba984e08b6dde765e471b3f491a318282be85b987875557f16bb36acad2cfdeec6c4a79f0c15cede0364f2a4c5534a5157522df13072086cc072283432df889209afafe999bd4c59b8f7e7e31d5db505b39bc7c86d6b441a2207e5766325684072aa892a3d", [""]}, 0x1010}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) r2 = socket(0x18, 0x6, 0x0) sendmmsg$alg(r2, &(0x7f0000001640)=[{0x6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}, {0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000280)="5394807b334780a55df6d8588dd8e2112ffba863326a2c770a19be0e6fa5fc74652a0e3ebd3568490fb11ced4f139ae27678677fee45bee43c945457079d52b7bcd3fe5c1c79596dedc6adbeef5390d65e53c18fb9c60b22cb7ffac037c2794c5825c78a90d6490e00c1988995393cfeffd417169faf2b1d56260f923f7e974d1c1b2214a96724907292817234da256c3ca29b8e293ca8a6a7feee3874575d9084b053ae6ddabb4282f31f5bca2a580c9a2dfbef804c6fb573b1a17c2a4192cb4caa0901abb2d63d76cce4369613a845557bb7ea588cff910fb17c68739fae92e31cd34b21dd31daf5d8dd0b", 0xec}], 0x2, &(0x7f0000001440)=[@assoc={0x18, 0x117, 0x4, 0x9d6}, @iv={0x38, 0x117, 0x2, 0x24, "e8a0ee845b87bd14fadae8872950d3d6acd4c512e566a2a7020d0890ecc29cdd2ba07ca3"}, @assoc={0x18, 0x117, 0x4, 0xa93}, @op={0x18}, @iv={0x58, 0x117, 0x2, 0x40, "726c330edd2ed1f703d1ff2fc4828ba71e0dfde45f009e29e7cef5a0d83199c622c26cd47ccbf29e628de7a1a633cef58a0d8deff0efadaaf54f7c328ac8075c"}, @op={0x18}], 0xf0, 0x10000010}, {0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001540)="a3679fff8385956d264d5376770bfa2b05b505cb4c380f33297cb9ab5a53ed5b90d22dfdd6b22e58897a09b8cd90cdfdba681ddb7adc36b46e8ab3a0c8d681fd57c6404bb4f017e291ede8359cce8f77ccbf5ca5734d68e9786d289bf20e6054404c09b43a7ad1562d8f8641b124b28072c39591651bdcf6ce4607dc53046c8d1b84eef4a34b849699e58ff031b34e55a65276bc57174504b97b5703dbeba69f52d0a6989f9ea693748c771e5c3b8aa84f9b7016078671ab9acbf32972b610f81eef015ac39fa4322863243f92c2c1d870046542c2d97cbe820a5f06b37557ed50af127244bf83c0f933", 0xea}, {&(0x7f0000000080)="ba083652235ada", 0x7}, {&(0x7f0000000180)="3a41fa6e03d004c57052b0d7b059c9a2213998273e03b573d66a92ad5de4c01ae9c52eeba62d34dff988212f5f3839febcf119cf4981b8a6aeea49983820a2322819c03d830526b694874b3e66ea7a9dcf3e04c3ef9fc8aa9913f6766c690a172775d16b8082b8e9", 0x68}], 0x3}], 0x3, 0x0) 20:07:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 180.003055][T12433] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 180.087039][T12447] IPVS: ftp: loaded support on port[0] = 21 [ 180.103571][T12448] befs: Unrecognized mount option "audit" or missing value [ 180.133893][T12448] befs: (loop1): cannot parse mount options 20:07:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 180.177104][T12447] IPVS: ftp: loaded support on port[0] = 21 [ 180.204710][T12448] befs: Unrecognized mount option "audit" or missing value [ 180.213780][T12448] befs: (loop1): cannot parse mount options 20:07:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 180.329541][T12504] befs: Unrecognized mount option "audit" or missing value [ 180.354712][T12504] befs: (loop1): cannot parse mount options [ 180.414983][T12504] befs: Unrecognized mount option "audit" or missing value [ 180.423719][T12504] befs: (loop1): cannot parse mount options 20:07:25 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:25 executing program 3: clone(0x632a8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:07:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 181.275066][T12571] befs: Unrecognized mount option "audit" or missing value 20:07:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) [ 181.328561][T12581] IPVS: ftp: loaded support on port[0] = 21 [ 181.336231][T12571] befs: (loop1): cannot parse mount options 20:07:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 181.418575][T12571] befs: Unrecognized mount option "audit" or missing value [ 181.442393][T12571] befs: (loop1): cannot parse mount options 20:07:26 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:26 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:26 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 181.665655][T12634] befs: Unrecognized mount option "audit" or missing value [ 181.673023][T12634] befs: (loop1): cannot parse mount options 20:07:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) [ 181.750404][T12641] befs: Unrecognized mount option "audit" or missing value [ 181.758685][T12641] befs: (loop2): cannot parse mount options [ 181.766544][T12634] befs: Unrecognized mount option "audit" or missing value [ 181.774043][T12634] befs: (loop1): cannot parse mount options 20:07:26 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:26 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x11, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 181.923759][T12668] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 181.978813][T12683] befs: Unrecognized mount option "audit" or missing value [ 181.986321][T12683] befs: (loop1): cannot parse mount options [ 182.027619][T12683] befs: Unrecognized mount option "audit" or missing value [ 182.039064][T12683] befs: (loop1): cannot parse mount options 20:07:27 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:27 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 20:07:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x12, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:27 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x11, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 182.634297][T12703] befs: Unrecognized mount option "audit" or missing value [ 182.634902][T12706] befs: Unrecognized mount option "audit" or missing value [ 182.650819][T12708] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 182.668216][T12706] befs: (loop2): cannot parse mount options 20:07:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 182.726084][T12703] befs: (loop1): cannot parse mount options 20:07:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a19f989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) [ 182.793734][T12703] befs: Unrecognized mount option "audit" or missing value [ 182.800997][T12703] befs: (loop1): cannot parse mount options 20:07:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1a, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 182.876796][T12724] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 182.956730][T12729] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 183.031288][T12735] befs: Unrecognized mount option "audit" or missing value [ 183.069852][T12735] befs: (loop1): cannot parse mount options 20:07:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 183.168372][T12735] befs: Unrecognized mount option "audit" or missing value [ 183.180497][T12735] befs: (loop1): cannot parse mount options [ 183.182337][T12748] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:28 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:28 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:28 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1b, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 183.688280][T12773] befs: Unrecognized mount option "audit" or missing value [ 183.726331][T12778] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 183.728738][T12773] befs: (loop1): cannot parse mount options 20:07:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:28 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x12, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 183.784542][T12784] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 183.835255][T12773] befs: Unrecognized mount option "audit" or missing value [ 183.864266][T12773] befs: (loop1): cannot parse mount options 20:07:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 183.885962][T12798] befs: Unrecognized mount option "audit" or missing value [ 183.894798][T12798] befs: (loop2): cannot parse mount options [ 183.906178][T12800] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 20:07:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:28 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:29 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:29 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) 20:07:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)={"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"}) 20:07:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000001ff) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) [ 184.714689][T12839] befs: Unrecognized mount option "audit" or missing value [ 184.725930][T12839] befs: (loop1): cannot parse mount options [ 184.753734][T12839] befs: Unrecognized mount option "audit" or missing value 20:07:29 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:29 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 184.792252][T12839] befs: (loop1): cannot parse mount options 20:07:29 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x25, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 185.209375][T12867] befs: Unrecognized mount option "audit" or missing value [ 185.370210][T12867] befs: (loop1): cannot parse mount options 20:07:29 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:30 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:30 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 185.935683][T12877] befs: Unrecognized mount option "audit" or missing value 20:07:30 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:30 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 186.006978][T12877] befs: (loop1): cannot parse mount options [ 186.095321][T12877] befs: Unrecognized mount option "audit" or missing value [ 186.111654][T12877] befs: (loop1): cannot parse mount options 20:07:30 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 186.474650][T12900] befs: Unrecognized mount option "audit" or missing value [ 186.488810][T12900] befs: (loop1): cannot parse mount options 20:07:31 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 186.579176][T12900] befs: Unrecognized mount option "audit" or missing value [ 186.593261][T12900] befs: (loop1): cannot parse mount options 20:07:31 executing program 0: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 186.837843][T12908] befs: Unrecognized mount option "audit" or missing value 20:07:31 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 187.029684][T12914] befs: Unrecognized mount option "audit" or missing value [ 187.045908][T12908] befs: (loop1): cannot parse mount options [ 187.048369][T12914] befs: (loop0): cannot parse mount options 20:07:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:31 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:31 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:31 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 187.231155][T12908] befs: Unrecognized mount option "audit" or missing value [ 187.313745][T12908] befs: (loop1): cannot parse mount options 20:07:31 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:32 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x68, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 187.637577][T12939] befs: Unrecognized mount option "audit" or missing value [ 187.651458][T12939] befs: (loop1): cannot parse mount options [ 187.784996][T12943] befs: Unrecognized mount option "audit" or missing value [ 187.796251][T12943] befs: (loop1): cannot parse mount options 20:07:32 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 187.863604][T12943] befs: Unrecognized mount option "audit" or missing value [ 187.873254][T12943] befs: (loop1): cannot parse mount options 20:07:32 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:32 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:32 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x74, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 188.213800][T12955] befs: Unrecognized mount option "audit" or missing value 20:07:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:32 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 188.309397][T12955] befs: (loop1): cannot parse mount options [ 188.419643][T12955] befs: Unrecognized mount option "audit" or missing value 20:07:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 188.459586][T12967] befs: Unrecognized mount option "audit" or missing value [ 188.478916][T12955] befs: (loop1): cannot parse mount options [ 188.504767][T12967] befs: (loop2): cannot parse mount options 20:07:33 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:33 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x74, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 188.717769][T12979] befs: Unrecognized mount option "audit" or missing value [ 188.742888][T12979] befs: (loop1): cannot parse mount options [ 188.834673][T12983] befs: Unrecognized mount option "audit" or missing value [ 188.886752][T12983] befs: (loop2): cannot parse mount options 20:07:33 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:33 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:33 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:33 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 189.254336][T12994] befs: Unrecognized mount option "audit" or missing value [ 189.320901][T12994] befs: (loop1): cannot parse mount options 20:07:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 189.436957][T12994] befs: Unrecognized mount option "audit" or missing value [ 189.451212][T12994] befs: (loop1): cannot parse mount options 20:07:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 189.703477][T13012] befs: Unrecognized mount option "audit" or missing value [ 189.777687][T13012] befs: (loop1): cannot parse mount options 20:07:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:34 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:34 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 190.166993][T13022] befs: Unrecognized mount option "audit" or missing value [ 190.208443][T13022] befs: (loop1): cannot parse mount options 20:07:34 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 190.349252][T13022] befs: Unrecognized mount option "audit" or missing value [ 190.371846][T13022] befs: (loop1): cannot parse mount options 20:07:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:35 executing program 0: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 190.746611][T13046] befs: Unrecognized mount option "audit" or missing value [ 190.760058][T13046] befs: (loop1): cannot parse mount options [ 190.771994][T13048] befs: Unrecognized mount option "audit" or missing value 20:07:35 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x900, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 190.869201][T13048] befs: (loop0): cannot parse mount options [ 191.022583][T13052] befs: Unrecognized mount option "audit" or missing value 20:07:35 executing program 0: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:35 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 191.163828][T13052] befs: (loop1): cannot parse mount options [ 191.195256][T13062] befs: Unrecognized mount option "audit" or missing value [ 191.218309][T13062] befs: (loop0): cannot parse mount options [ 191.311142][T13052] befs: Unrecognized mount option "audit" or missing value [ 191.348916][T13052] befs: (loop1): cannot parse mount options 20:07:35 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:35 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 191.622060][T13082] befs: Unrecognized mount option "audit" or missing value [ 191.688009][T13082] befs: (loop1): cannot parse mount options [ 191.787066][T13082] befs: Unrecognized mount option "audit" or missing value [ 191.802699][T13082] befs: (loop1): cannot parse mount options 20:07:36 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xb00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:36 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 192.105438][T13093] befs: Unrecognized mount option "audit" or missing value [ 192.201939][T13093] befs: (loop1): cannot parse mount options 20:07:36 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 192.259576][T13093] befs: Unrecognized mount option "audit" or missing value [ 192.278585][T13093] befs: (loop1): cannot parse mount options 20:07:36 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xbe4, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:36 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 192.433944][T13106] befs: Unrecognized mount option "audit" or missing value [ 192.442500][T13106] befs: (loop1): cannot parse mount options 20:07:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 192.539658][T13106] befs: Unrecognized mount option "audit" or missing value [ 192.555702][T13106] befs: (loop1): cannot parse mount options 20:07:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xbe5, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 192.734015][T13122] befs: Unrecognized mount option "audit" or missing value [ 192.744406][T13122] befs: (loop1): cannot parse mount options [ 192.805333][T13122] befs: Unrecognized mount option "audit" or missing value [ 192.813222][T13122] befs: (loop1): cannot parse mount options 20:07:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xc00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:37 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 192.955050][T13130] befs: Unrecognized mount option "audit" or missing value [ 192.989563][T13130] befs: (loop1): cannot parse mount options [ 193.103614][T13130] befs: Unrecognized mount option "audit" or missing value [ 193.111880][T13130] befs: (loop1): cannot parse mount options 20:07:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xd00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:37 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 193.322390][T13145] befs: Unrecognized mount option "audit" or missing value [ 193.330339][T13145] befs: (loop1): cannot parse mount options 20:07:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 193.476729][T13145] befs: Unrecognized mount option "audit" or missing value [ 193.484951][T13145] befs: (loop1): cannot parse mount options 20:07:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:38 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:38 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 193.632146][T13154] befs: Unrecognized mount option "audit" or missing value [ 193.640165][T13154] befs: (loop1): cannot parse mount options [ 193.814210][T13154] befs: Unrecognized mount option "audit" or missing value [ 193.847592][T13154] befs: (loop1): cannot parse mount options 20:07:38 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1020, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:38 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:38 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 194.111814][T13173] befs: Unrecognized mount option "audit" or missing value 20:07:38 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 194.181748][T13173] befs: (loop1): cannot parse mount options [ 194.241173][T13173] befs: Unrecognized mount option "audit" or missing value [ 194.251950][T13173] befs: (loop1): cannot parse mount options 20:07:38 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1100, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 194.435127][T13187] befs: Unrecognized mount option "audit" or missing value [ 194.503182][T13187] befs: (loop1): cannot parse mount options 20:07:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 194.584653][T13187] befs: Unrecognized mount option "audit" or missing value [ 194.593439][T13187] befs: (loop1): cannot parse mount options 20:07:39 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:39 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1200, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 194.817361][T13203] befs: Unrecognized mount option "audit" or missing value [ 194.847670][T13203] befs: (loop1): cannot parse mount options 20:07:39 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1100, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 194.919102][T13203] befs: Unrecognized mount option "audit" or missing value [ 194.926704][T13203] befs: (loop1): cannot parse mount options 20:07:39 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1a00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 195.039639][T13211] befs: Unrecognized mount option "audit" or missing value [ 195.047128][T13211] befs: (loop2): cannot parse mount options 20:07:39 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:39 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 195.132850][T13215] befs: Unrecognized mount option "audit" or missing value [ 195.140112][T13215] befs: (loop1): cannot parse mount options [ 195.299993][T13215] befs: Unrecognized mount option "audit" or missing value [ 195.308733][T13215] befs: (loop1): cannot parse mount options 20:07:39 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) 20:07:39 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1b00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:40 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 195.554139][T13236] befs: Unrecognized mount option "audit" or missing value [ 195.564860][T13236] befs: (loop1): cannot parse mount options 20:07:40 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:40 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 195.668679][T13236] befs: Unrecognized mount option "audit" or missing value [ 195.701582][T13236] befs: (loop1): cannot parse mount options 20:07:40 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 195.899560][T13253] befs: Unrecognized mount option "audit" or missing value [ 195.920259][T13253] befs: (loop1): cannot parse mount options 20:07:40 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:40 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 196.103813][T13253] befs: Unrecognized mount option "audit" or missing value [ 196.116763][T13253] befs: (loop1): cannot parse mount options 20:07:40 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:40 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 196.349933][T13271] befs: Unrecognized mount option "audit" or missing value [ 196.376220][T13271] befs: (loop1): cannot parse mount options 20:07:40 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:40 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 196.516439][T13271] befs: Unrecognized mount option "audit" or missing value [ 196.543862][T13271] befs: (loop1): cannot parse mount options 20:07:41 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2010, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:41 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 196.810276][T13288] befs: Unrecognized mount option "audit" or missing value [ 196.830135][T13288] befs: (loop1): cannot parse mount options [ 196.996813][T13288] befs: Unrecognized mount option "audit" or missing value [ 197.025586][T13288] befs: (loop1): cannot parse mount options 20:07:41 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:41 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2500, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:41 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 197.308498][T13300] befs: Unrecognized mount option "audit" or missing value [ 197.324947][T13300] befs: (loop2): cannot parse mount options 20:07:41 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 197.396642][T13306] befs: Unrecognized mount option "audit" or missing value [ 197.429818][T13306] befs: (loop1): cannot parse mount options 20:07:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 197.516420][T13306] befs: Unrecognized mount option "audit" or missing value [ 197.523963][T13306] befs: (loop1): cannot parse mount options 20:07:42 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 197.874093][T13326] befs: Unrecognized mount option "audit" or missing value [ 197.882913][T13326] befs: (loop1): cannot parse mount options 20:07:42 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) [ 197.958261][T13326] befs: Unrecognized mount option "audit" or missing value [ 198.094444][T13326] befs: (loop1): cannot parse mount options 20:07:42 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:42 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:42 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4800, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:42 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 198.463886][T13341] befs: Unrecognized mount option "audit" or missing value [ 198.536281][T13341] befs: (loop1): cannot parse mount options 20:07:43 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:43 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:43 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:43 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 198.804223][T13363] befs: Unrecognized mount option "audit" or missing value [ 198.812257][T13363] befs: (loop1): cannot parse mount options 20:07:43 executing program 2: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 198.970472][T13367] befs: Unrecognized mount option "audit" or missing value [ 198.977882][T13367] befs: (loop1): cannot parse mount options [ 198.981654][T13370] befs: Unrecognized mount option "audit" or missing value [ 198.997220][T13370] befs: (loop2): cannot parse mount options [ 199.045038][T13367] befs: Unrecognized mount option "audit" or missing value [ 199.059082][T13367] befs: (loop1): cannot parse mount options 20:07:43 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:43 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:43 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 199.314881][T13382] befs: Unrecognized mount option "audit" or missing value [ 199.324384][T13382] befs: (loop1): cannot parse mount options 20:07:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 199.426515][T13382] befs: Unrecognized mount option "audit" or missing value [ 199.439675][T13382] befs: (loop1): cannot parse mount options 20:07:43 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:44 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 199.663499][T13393] befs: Unrecognized mount option "audit" or missing value [ 199.674678][T13393] befs: (loop1): cannot parse mount options [ 199.713866][T13393] befs: Unrecognized mount option "audit" or missing value [ 199.782277][T13393] befs: (loop1): cannot parse mount options 20:07:44 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:44 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 200.115181][T13409] befs: Unrecognized mount option "audit" or missing value 20:07:44 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 200.214577][T13409] befs: (loop1): cannot parse mount options 20:07:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 200.317732][T13409] befs: Unrecognized mount option "audit" or missing value 20:07:44 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 200.358763][T13409] befs: (loop1): cannot parse mount options 20:07:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 200.497469][T13424] befs: Unrecognized mount option "audit" or missing value [ 200.504820][T13424] befs: (loop1): cannot parse mount options 20:07:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 200.605490][T13424] befs: Unrecognized mount option "audit" or missing value [ 200.624037][T13424] befs: (loop1): cannot parse mount options 20:07:45 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7a00, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:45 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 201.037427][T13440] befs: Unrecognized mount option "audit" or missing value [ 201.117784][T13440] befs: (loop1): cannot parse mount options 20:07:45 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:45 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:45 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe40b, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) [ 201.388723][T13449] befs: Unrecognized mount option "audit" or missing value 20:07:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 201.446350][T13449] befs: (loop1): cannot parse mount options [ 201.531305][T13449] befs: Unrecognized mount option "audit" or missing value [ 201.539695][T13449] befs: (loop1): cannot parse mount options 20:07:46 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe50b, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 201.718095][T13466] befs: Unrecognized mount option "audit" or missing value [ 201.725545][T13466] befs: (loop1): cannot parse mount options [ 201.791561][T13466] befs: Unrecognized mount option "audit" or missing value [ 201.805621][T13466] befs: (loop1): cannot parse mount options 20:07:46 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:46 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 202.048673][T13475] befs: Unrecognized mount option "audit" or missing value [ 202.068463][T13475] befs: (loop1): cannot parse mount options 20:07:46 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) [ 202.178339][T13475] befs: Unrecognized mount option "audit" or missing value [ 202.186247][T13475] befs: (loop1): cannot parse mount options 20:07:46 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x20000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) 20:07:46 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 202.473255][T13493] befs: Unrecognized mount option "audit" or missing value [ 202.480973][T13493] befs: (loop1): cannot parse mount options [ 202.549897][T13493] befs: Unrecognized mount option "audit" or missing value [ 202.585374][T13493] befs: (loop1): cannot parse mount options 20:07:47 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:47 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 202.837201][T13507] befs: Unrecognized mount option "audit" or missing value [ 202.873152][T13507] befs: (loop1): cannot parse mount options [ 202.942238][T13507] befs: Unrecognized mount option "audit" or missing value [ 202.950342][T13507] befs: (loop1): cannot parse mount options 20:07:47 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x80040, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 203.094304][T13517] befs: Unrecognized mount option "audit" or missing value 20:07:47 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 203.159719][T13517] befs: (loop1): cannot parse mount options [ 203.244418][T13517] befs: Unrecognized mount option "audit" or missing value [ 203.253758][T13517] befs: (loop1): cannot parse mount options 20:07:47 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x200005, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:47 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 203.497663][T13531] befs: Unrecognized mount option "audit" or missing value [ 203.510702][T13531] befs: (loop1): cannot parse mount options 20:07:47 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) [ 203.578711][T13531] befs: Unrecognized mount option "audit" or missing value [ 203.600179][T13531] befs: (loop1): cannot parse mount options 20:07:48 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x400000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:48 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 203.811794][T13544] befs: Unrecognized mount option "audit" or missing value [ 203.819497][T13544] befs: (loop1): cannot parse mount options [ 203.903096][T13544] befs: Unrecognized mount option "audit" or missing value [ 203.910553][T13544] befs: (loop1): cannot parse mount options 20:07:48 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe0ffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 204.082205][T13555] befs: Unrecognized mount option "audit" or missing value [ 204.089890][T13555] befs: (loop1): cannot parse mount options 20:07:48 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 204.154108][T13555] befs: Unrecognized mount option "audit" or missing value [ 204.197550][T13555] befs: (loop1): cannot parse mount options 20:07:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:48 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 204.436613][T13570] befs: Unrecognized mount option "audit" or missing value [ 204.490402][T13570] befs: (loop1): cannot parse mount options 20:07:48 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) [ 204.568794][T13570] befs: Unrecognized mount option "audit" or missing value [ 204.591795][T13570] befs: (loop1): cannot parse mount options 20:07:49 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:49 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:49 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 204.788936][T13587] befs: Unrecognized mount option "audit" or missing value [ 204.810897][T13587] befs: (loop1): cannot parse mount options [ 204.890756][T13587] befs: Unrecognized mount option "audit" or missing value [ 204.935008][T13587] befs: (loop1): cannot parse mount options 20:07:49 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:49 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 205.186046][T13596] befs: Unrecognized mount option "audit" or missing value [ 205.193487][T13596] befs: (loop1): cannot parse mount options [ 205.243949][T13596] befs: Unrecognized mount option "audit" or missing value [ 205.251594][T13596] befs: (loop1): cannot parse mount options 20:07:49 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 205.361731][T13609] befs: Unrecognized mount option "audit" or missing value [ 205.369827][T13609] befs: (loop1): cannot parse mount options [ 205.426046][T13609] befs: Unrecognized mount option "audit" or missing value [ 205.436574][T13609] befs: (loop1): cannot parse mount options 20:07:49 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:49 executing program 4: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:50 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 205.576372][T13617] befs: Unrecognized mount option "audit" or missing value [ 205.601835][T13617] befs: (loop1): cannot parse mount options [ 205.615812][T13619] befs: Unrecognized mount option "audit" or missing value 20:07:50 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 205.629784][T13619] befs: (loop4): cannot parse mount options [ 205.712355][T13617] befs: Unrecognized mount option "audit" or missing value [ 205.727456][T13617] befs: (loop1): cannot parse mount options 20:07:50 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:50 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5002000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:50 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 205.981429][T13636] befs: Unrecognized mount option "audit" or missing value [ 206.009298][T13636] befs: (loop1): cannot parse mount options 20:07:50 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 206.163545][T13636] befs: Unrecognized mount option "audit" or missing value [ 206.172725][T13636] befs: (loop1): cannot parse mount options 20:07:50 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 206.319619][T13648] befs: Unrecognized mount option "audit" or missing value [ 206.327783][T13648] befs: (loop1): cannot parse mount options 20:07:50 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:50 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 206.516837][T13648] befs: Unrecognized mount option "audit" or missing value [ 206.524942][T13648] befs: (loop1): cannot parse mount options 20:07:51 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 206.739368][T13666] befs: Unrecognized mount option "audit" or missing value [ 206.763956][T13666] befs: (loop1): cannot parse mount options 20:07:51 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 206.807765][T13666] befs: Unrecognized mount option "audit" or missing value [ 206.819522][T13666] befs: (loop1): cannot parse mount options 20:07:51 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:51 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 207.000921][T13676] befs: Unrecognized mount option "audit" or missing value [ 207.054350][T13676] befs: (loop1): cannot parse mount options 20:07:51 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 207.179207][T13676] befs: Unrecognized mount option "audit" or missing value [ 207.195843][T13676] befs: (loop1): cannot parse mount options 20:07:51 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x9000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:51 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 207.457042][T13693] befs: Unrecognized mount option "audit" or missing value [ 207.559242][T13693] befs: (loop1): cannot parse mount options 20:07:52 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:52 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 207.852756][T13704] befs: Unrecognized mount option "audit" or missing value [ 207.860064][T13704] befs: (loop1): cannot parse mount options 20:07:52 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 207.979558][T13704] befs: Unrecognized mount option "audit" or missing value [ 208.019495][T13704] befs: (loop1): cannot parse mount options 20:07:52 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xb000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:52 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:07:52 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:52 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 208.374863][T13722] befs: Unrecognized mount option "audit" or missing value [ 208.382700][T13722] befs: (loop1): cannot parse mount options [ 208.447801][T13722] befs: Unrecognized mount option "audit" or missing value [ 208.455771][T13722] befs: (loop1): cannot parse mount options 20:07:52 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xc000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 208.649095][T13733] befs: Unrecognized mount option "audit" or missing value [ 208.670922][T13733] befs: (loop1): cannot parse mount options [ 208.782586][T13733] befs: Unrecognized mount option "audit" or missing value [ 208.798293][T13733] befs: (loop1): cannot parse mount options 20:07:53 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xd000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:53 executing program 4: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xb000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:53 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 208.995335][T13741] befs: Unrecognized mount option "audit" or missing value [ 209.003988][T13741] befs: (loop1): cannot parse mount options 20:07:53 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 209.074226][T13741] befs: Unrecognized mount option "audit" or missing value [ 209.091043][T13744] befs: Unrecognized mount option "audit" or missing value [ 209.154540][T13741] befs: (loop1): cannot parse mount options 20:07:53 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:53 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 209.196586][T13744] befs: (loop4): cannot parse mount options 20:07:53 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:53 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:53 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 209.448549][T13766] befs: Unrecognized mount option "audit" or missing value [ 209.460938][T13766] befs: (loop1): cannot parse mount options [ 209.517322][T13766] befs: Unrecognized mount option "audit" or missing value [ 209.531891][T13766] befs: (loop1): cannot parse mount options 20:07:54 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:54 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:54 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 209.744951][T13776] befs: Unrecognized mount option "audit" or missing value [ 209.807451][T13776] befs: (loop1): cannot parse mount options 20:07:54 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x11000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:54 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 210.062416][T13788] befs: Unrecognized mount option "audit" or missing value [ 210.084049][T13788] befs: (loop1): cannot parse mount options 20:07:54 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 210.181456][T13788] befs: Unrecognized mount option "audit" or missing value [ 210.204175][T13788] befs: (loop1): cannot parse mount options 20:07:54 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x12000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 210.421456][T13800] befs: Unrecognized mount option "audit" or missing value [ 210.428821][T13800] befs: (loop1): cannot parse mount options 20:07:54 executing program 5: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 210.505745][T13800] befs: Unrecognized mount option "audit" or missing value [ 210.539997][T13800] befs: (loop1): cannot parse mount options 20:07:55 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:55 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:55 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1a000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 210.787613][T13815] befs: Unrecognized mount option "audit" or missing value [ 210.924744][T13815] befs: (loop1): cannot parse mount options 20:07:55 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:55 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1b000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 211.149079][T13824] befs: Unrecognized mount option "audit" or missing value [ 211.203750][T13824] befs: (loop1): cannot parse mount options 20:07:55 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:55 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1c000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:55 executing program 5: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:55 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1dc2bee6, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 211.477551][T13836] befs: Unrecognized mount option "audit" or missing value [ 211.512178][T13836] befs: (loop1): cannot parse mount options 20:07:56 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:56 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:56 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x20100000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:56 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 211.797065][T13851] befs: Unrecognized mount option "audit" or missing value [ 211.823039][T13851] befs: (loop1): cannot parse mount options [ 211.878904][T13851] befs: Unrecognized mount option "audit" or missing value [ 211.946800][T13851] befs: (loop1): cannot parse mount options 20:07:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:56 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x25000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:56 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:56 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:56 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 212.332600][T13869] befs: Unrecognized mount option "audit" or missing value [ 212.340239][T13869] befs: (loop1): cannot parse mount options 20:07:56 executing program 5: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 212.395346][T13869] befs: Unrecognized mount option "audit" or missing value [ 212.403251][T13869] befs: (loop1): cannot parse mount options 20:07:56 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 212.600359][T13881] befs: Unrecognized mount option "audit" or missing value [ 212.614010][T13881] befs: (loop1): cannot parse mount options 20:07:57 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 212.676050][T13881] befs: Unrecognized mount option "audit" or missing value [ 212.689061][T13881] befs: (loop1): cannot parse mount options 20:07:57 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x40000800, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 212.906472][T13892] befs: Unrecognized mount option "audit" or missing value [ 212.920795][T13892] befs: (loop1): cannot parse mount options 20:07:57 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 212.964034][T13892] befs: Unrecognized mount option "audit" or missing value [ 212.977791][T13892] befs: (loop1): cannot parse mount options 20:07:57 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x48000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 213.136680][T13903] befs: Unrecognized mount option "audit" or missing value [ 213.154483][T13903] befs: (loop1): cannot parse mount options [ 213.212662][T13903] befs: Unrecognized mount option "audit" or missing value [ 213.221044][T13903] befs: (loop1): cannot parse mount options 20:07:57 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:57 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:57 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:57 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 213.499624][T13918] befs: Unrecognized mount option "audit" or missing value [ 213.510126][T13918] befs: (loop1): cannot parse mount options [ 213.558652][T13918] befs: Unrecognized mount option "audit" or missing value [ 213.566090][T13918] befs: (loop1): cannot parse mount options 20:07:58 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5c000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:58 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 213.735588][T13929] befs: Unrecognized mount option "audit" or missing value [ 213.742918][T13929] befs: (loop1): cannot parse mount options [ 213.792140][T13929] befs: Unrecognized mount option "audit" or missing value [ 213.799419][T13929] befs: (loop1): cannot parse mount options 20:07:58 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x60000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:58 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 214.092274][T13940] befs: Unrecognized mount option "audit" or missing value [ 214.125326][T13940] befs: (loop1): cannot parse mount options 20:07:58 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 214.259593][T13940] befs: Unrecognized mount option "audit" or missing value [ 214.273608][T13940] befs: (loop1): cannot parse mount options 20:07:58 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:58 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x68000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:58 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:58 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 214.505551][T13956] befs: Unrecognized mount option "audit" or missing value [ 214.540518][T13956] befs: (loop1): cannot parse mount options [ 214.607075][T13956] befs: Unrecognized mount option "audit" or missing value [ 214.647828][T13956] befs: (loop1): cannot parse mount options 20:07:59 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 214.928030][T13974] befs: Unrecognized mount option "audit" or missing value [ 214.936292][T13974] befs: (loop1): cannot parse mount options [ 214.987679][T13974] befs: Unrecognized mount option "audit" or missing value [ 215.023622][T13974] befs: (loop1): cannot parse mount options 20:07:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:07:59 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x74000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:59 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:59 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 215.304379][T13985] befs: Unrecognized mount option "audit" or missing value [ 215.340825][T13985] befs: (loop1): cannot parse mount options 20:07:59 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:07:59 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:07:59 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 215.390961][T13985] befs: Unrecognized mount option "audit" or missing value [ 215.428848][T13985] befs: (loop1): cannot parse mount options [ 215.554673][T14000] befs: Unrecognized mount option "audit" or missing value [ 215.566466][T14000] befs: (loop1): cannot parse mount options 20:08:00 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 215.812161][T14008] befs: Unrecognized mount option "audit" or missing value [ 215.856735][T14008] befs: (loop1): cannot parse mount options 20:08:00 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 215.928009][T14008] befs: Unrecognized mount option "audit" or missing value [ 215.937243][T14008] befs: (loop1): cannot parse mount options 20:08:00 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:00 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:00 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:00 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:00 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:00 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 216.290980][T14026] befs: Unrecognized mount option "audit" or missing value [ 216.325946][T14026] befs: (loop1): cannot parse mount options [ 216.421339][T14026] befs: Unrecognized mount option "audit" or missing value [ 216.443621][T14026] befs: (loop1): cannot parse mount options 20:08:00 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe40b0000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:01 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 216.779254][T14041] befs: Unrecognized mount option "audit" or missing value [ 216.825770][T14041] befs: (loop1): cannot parse mount options 20:08:01 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe50b0000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 216.972529][T14049] befs: Unrecognized mount option "audit" or missing value [ 216.979974][T14049] befs: (loop1): cannot parse mount options 20:08:01 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 217.033214][T14049] befs: Unrecognized mount option "audit" or missing value [ 217.040445][T14049] befs: (loop1): cannot parse mount options 20:08:01 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:01 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe6bec21d, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:01 executing program 4: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe50b0000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 217.234983][T14060] befs: Unrecognized mount option "audit" or missing value [ 217.255697][T14060] befs: (loop1): cannot parse mount options [ 217.273043][T14063] befs: Unrecognized mount option "audit" or missing value 20:08:01 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 217.296554][T14063] befs: (loop4): cannot parse mount options 20:08:01 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:01 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 217.448114][T14069] befs: Unrecognized mount option "audit" or missing value [ 217.496516][T14069] befs: (loop1): cannot parse mount options [ 217.563775][T14069] befs: Unrecognized mount option "audit" or missing value [ 217.573187][T14069] befs: (loop1): cannot parse mount options 20:08:02 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:02 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xf9fdffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 217.812720][T14086] befs: Unrecognized mount option "audit" or missing value [ 217.829892][T14086] befs: (loop1): cannot parse mount options [ 217.907425][T14086] befs: Unrecognized mount option "audit" or missing value [ 217.918150][T14086] befs: (loop1): cannot parse mount options 20:08:02 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:02 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:02 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 218.096791][T14097] befs: Unrecognized mount option "audit" or missing value [ 218.108867][T14097] befs: (loop1): cannot parse mount options [ 218.201121][T14097] befs: Unrecognized mount option "audit" or missing value [ 218.209480][T14097] befs: (loop1): cannot parse mount options 20:08:02 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:02 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:02 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 218.443578][T14110] befs: Unrecognized mount option "audit" or missing value [ 218.455882][T14110] befs: (loop1): cannot parse mount options 20:08:03 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:03 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffe000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 218.765524][T14122] befs: Unrecognized mount option "audit" or missing value [ 218.773558][T14122] befs: (loop1): cannot parse mount options [ 218.830680][T14122] befs: Unrecognized mount option "audit" or missing value [ 218.840850][T14122] befs: (loop1): cannot parse mount options 20:08:03 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdf9, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:03 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:03 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 219.026153][T14129] befs: Unrecognized mount option "audit" or missing value [ 219.046797][T14129] befs: (loop1): cannot parse mount options [ 219.116913][T14129] befs: Unrecognized mount option "audit" or missing value [ 219.126725][T14129] befs: (loop1): cannot parse mount options 20:08:03 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:03 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:03 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 219.316073][T14143] befs: Unrecognized mount option "audit" or missing value 20:08:03 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 219.433941][T14143] befs: (loop1): cannot parse mount options 20:08:03 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 219.623185][T14157] befs: Unrecognized mount option "audit" or missing value [ 219.636163][T14157] befs: (loop1): cannot parse mount options 20:08:04 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:04 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:04 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:04 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 219.959773][T14164] befs: Unrecognized mount option "audit" or missing value [ 219.989770][T14164] befs: (loop1): cannot parse mount options 20:08:04 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 220.072481][T14164] befs: Unrecognized mount option "audit" or missing value [ 220.079884][T14164] befs: (loop1): cannot parse mount options 20:08:04 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:04 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 220.252777][T14181] befs: Unrecognized mount option "audit" or missing value [ 220.267928][T14181] befs: (loop1): cannot parse mount options 20:08:04 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) [ 220.328494][T14181] befs: Unrecognized mount option "audit" or missing value [ 220.336137][T14181] befs: (loop1): cannot parse mount options 20:08:04 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:04 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x8000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 220.603429][T14193] befs: Unrecognized mount option "audit" or missing value 20:08:05 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:05 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 220.686800][T14193] befs: (loop1): cannot parse mount options 20:08:05 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 220.780459][T14193] befs: Unrecognized mount option "audit" or missing value [ 220.788997][T14193] befs: (loop1): cannot parse mount options 20:08:05 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x80000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 221.128118][T14213] befs: Unrecognized mount option "audit" or missing value [ 221.151739][T14213] befs: (loop1): cannot parse mount options [ 221.229222][T14213] befs: Unrecognized mount option "audit" or missing value [ 221.240621][T14213] befs: (loop1): cannot parse mount options 20:08:05 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:05 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:05 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) 20:08:05 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:05 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 221.507894][T14227] befs: Unrecognized mount option "audit" or missing value [ 221.527044][T14227] befs: (loop1): cannot parse mount options 20:08:06 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:06 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 221.710865][T14236] befs: Unrecognized mount option "audit" or missing value [ 221.722644][T14236] befs: (loop1): cannot parse mount options [ 221.764945][T14236] befs: Unrecognized mount option "audit" or missing value [ 221.773118][T14236] befs: (loop1): cannot parse mount options 20:08:06 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 222.117084][T14250] befs: Unrecognized mount option "audit" or missing value [ 222.170542][T14250] befs: (loop1): cannot parse mount options 20:08:06 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x40000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:06 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) 20:08:06 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:06 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:06 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe0ffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:06 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 222.377397][T14260] befs: Unrecognized mount option "audit" or missing value [ 222.384852][T14260] befs: (loop1): cannot parse mount options 20:08:06 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:07 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 222.629585][T14272] befs: Unrecognized mount option "audit" or missing value [ 222.644878][T14272] befs: (loop1): cannot parse mount options [ 222.705313][T14272] befs: Unrecognized mount option "audit" or missing value [ 222.713792][T14272] befs: (loop1): cannot parse mount options 20:08:07 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 222.892021][T14284] befs: Unrecognized mount option "audit" or missing value [ 222.899502][T14284] befs: (loop1): cannot parse mount options 20:08:07 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:07 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) 20:08:07 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 223.213518][T14292] befs: Unrecognized mount option "audit" or missing value [ 223.236169][T14292] befs: (loop1): cannot parse mount options 20:08:07 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 223.287567][T14292] befs: Unrecognized mount option "audit" or missing value [ 223.320437][T14292] befs: (loop1): cannot parse mount options 20:08:07 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:07 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 223.566288][T14311] befs: Unrecognized mount option "audit" or missing value [ 223.574090][T14311] befs: (loop1): cannot parse mount options [ 223.635891][T14311] befs: Unrecognized mount option "audit" or missing value [ 223.652711][T14311] befs: (loop1): cannot parse mount options 20:08:08 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:08 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 223.847162][T14321] befs: Unrecognized mount option "audit" or missing value [ 223.865441][T14321] befs: (loop1): cannot parse mount options [ 223.915246][T14321] befs: Unrecognized mount option "audit" or missing value [ 223.925503][T14321] befs: (loop1): cannot parse mount options 20:08:08 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x500200000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:08 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @sco, @l2tp={0x2, 0x0, @remote, 0x1}, @l2={0x1f, 0x5, @fixed={[], 0x10}, 0x2, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x24f8, &(0x7f0000000040)='ip6gre0\x00', 0x7f, 0x800, 0x81}) [ 224.046508][T14331] befs: Unrecognized mount option "audit" or missing value [ 224.062318][T14331] befs: (loop1): cannot parse mount options 20:08:08 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:08 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:08 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 224.373701][T14344] befs: Unrecognized mount option "audit" or missing value [ 224.398724][T14344] befs: (loop1): cannot parse mount options 20:08:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 224.495805][T14344] befs: Unrecognized mount option "audit" or missing value [ 224.507328][T14344] befs: (loop1): cannot parse mount options 20:08:09 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 224.825183][T14358] befs: Unrecognized mount option "audit" or missing value [ 224.837089][T14358] befs: (loop1): cannot parse mount options 20:08:09 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:09 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x800000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:09 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:09 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:09 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 225.117008][T14368] befs: Unrecognized mount option "audit" or missing value [ 225.150696][T14368] befs: (loop1): cannot parse mount options 20:08:09 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 225.219803][T14368] befs: Unrecognized mount option "audit" or missing value [ 225.230513][T14368] befs: (loop1): cannot parse mount options 20:08:09 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 225.424556][T14382] befs: Unrecognized mount option "audit" or missing value [ 225.436734][T14382] befs: (loop1): cannot parse mount options [ 225.483224][T14382] befs: Unrecognized mount option "audit" or missing value [ 225.493395][T14382] befs: (loop1): cannot parse mount options 20:08:10 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xb00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 225.667795][T14393] befs: Unrecognized mount option "audit" or missing value [ 225.675252][T14393] befs: (loop1): cannot parse mount options [ 225.738474][T14393] befs: Unrecognized mount option "audit" or missing value [ 225.746034][T14393] befs: (loop1): cannot parse mount options 20:08:10 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xc00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:10 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:10 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 225.885660][T14401] befs: Unrecognized mount option "audit" or missing value [ 225.895451][T14401] befs: (loop1): cannot parse mount options [ 225.973347][T14401] befs: Unrecognized mount option "audit" or missing value [ 225.982609][T14401] befs: (loop1): cannot parse mount options 20:08:10 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:10 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:10 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 226.088098][T14411] befs: Unrecognized mount option "audit" or missing value [ 226.104898][T14411] befs: (loop1): cannot parse mount options 20:08:10 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:10 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 226.189772][T14411] befs: Unrecognized mount option "audit" or missing value [ 226.203131][T14411] befs: (loop1): cannot parse mount options 20:08:10 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:10 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) [ 226.447960][T14431] befs: Unrecognized mount option "audit" or missing value [ 226.464586][T14431] befs: (loop1): cannot parse mount options [ 226.535795][T14431] befs: Unrecognized mount option "audit" or missing value [ 226.547910][T14431] befs: (loop1): cannot parse mount options 20:08:11 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:11 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:11 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:11 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:11 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 226.760151][T14446] befs: Unrecognized mount option "audit" or missing value [ 226.772680][T14446] befs: (loop1): cannot parse mount options [ 226.894298][T14446] befs: Unrecognized mount option "audit" or missing value [ 226.904710][T14446] befs: (loop1): cannot parse mount options 20:08:11 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:11 executing program 0: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:11 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1100000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:11 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 227.123835][T14467] befs: Unrecognized mount option "audit" or missing value [ 227.140737][T14467] befs: (loop1): cannot parse mount options [ 227.187421][T14467] befs: Unrecognized mount option "audit" or missing value [ 227.197712][T14467] befs: (loop1): cannot parse mount options 20:08:11 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1200000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 227.327818][T14475] befs: Unrecognized mount option "audit" or missing value [ 227.344393][T14475] befs: (loop1): cannot parse mount options [ 227.413408][T14475] befs: Unrecognized mount option "audit" or missing value [ 227.427372][T14475] befs: (loop1): cannot parse mount options 20:08:12 executing program 0: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:12 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1a00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:12 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:12 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 227.747318][T14484] befs: Unrecognized mount option "audit" or missing value [ 227.783993][T14484] befs: (loop1): cannot parse mount options [ 227.866235][T14484] befs: Unrecognized mount option "audit" or missing value [ 227.909837][T14484] befs: (loop1): cannot parse mount options 20:08:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:12 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:12 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1b00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 228.154826][T14504] befs: Unrecognized mount option "audit" or missing value [ 228.169707][T14504] befs: (loop1): cannot parse mount options 20:08:12 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1c00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:12 executing program 0: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 228.445185][T14513] befs: Unrecognized mount option "audit" or missing value [ 228.457214][T14513] befs: (loop1): cannot parse mount options 20:08:12 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 228.566014][T14513] befs: Unrecognized mount option "audit" or missing value 20:08:13 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 228.650155][T14513] befs: (loop1): cannot parse mount options 20:08:13 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:13 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x1dc2bee600000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 228.897229][T14530] befs: Unrecognized mount option "audit" or missing value [ 228.910262][T14530] befs: (loop1): cannot parse mount options 20:08:13 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:13 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 228.954295][T14530] befs: Unrecognized mount option "audit" or missing value [ 228.963443][T14530] befs: (loop1): cannot parse mount options 20:08:13 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 229.178031][T14541] befs: Unrecognized mount option "audit" or missing value [ 229.267035][T14541] befs: (loop1): cannot parse mount options [ 229.375034][T14541] befs: Unrecognized mount option "audit" or missing value [ 229.387956][T14541] befs: (loop1): cannot parse mount options 20:08:13 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2010000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:13 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:14 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 229.620103][T14553] befs: Unrecognized mount option "audit" or missing value [ 229.627667][T14553] befs: (loop1): cannot parse mount options 20:08:14 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 229.673156][T14553] befs: Unrecognized mount option "audit" or missing value [ 229.682968][T14553] befs: (loop1): cannot parse mount options 20:08:14 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x2500000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 229.831152][T14567] befs: Unrecognized mount option "audit" or missing value [ 229.842200][T14567] befs: (loop1): cannot parse mount options 20:08:14 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 229.906827][T14567] befs: Unrecognized mount option "audit" or missing value [ 229.930320][T14567] befs: (loop1): cannot parse mount options 20:08:14 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 230.113131][T14579] befs: Unrecognized mount option "audit" or missing value [ 230.122872][T14579] befs: (loop1): cannot parse mount options [ 230.215266][T14579] befs: Unrecognized mount option "audit" or missing value [ 230.230352][T14579] befs: (loop1): cannot parse mount options 20:08:14 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 230.379558][T14588] befs: Unrecognized mount option "audit" or missing value 20:08:14 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 230.474916][T14588] befs: (loop1): cannot parse mount options 20:08:14 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:14 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:14 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4000080000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 230.650095][T14601] befs: Unrecognized mount option "audit" or missing value [ 230.659493][T14601] befs: (loop1): cannot parse mount options 20:08:15 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:15 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 230.999888][T14613] befs: Unrecognized mount option "audit" or missing value [ 231.007413][T14613] befs: (loop1): cannot parse mount options 20:08:15 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 231.100979][T14613] befs: Unrecognized mount option "audit" or missing value [ 231.126560][T14613] befs: (loop1): cannot parse mount options 20:08:15 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:15 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x5c00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 231.335935][T14625] befs: Unrecognized mount option "audit" or missing value [ 231.354629][T14625] befs: (loop1): cannot parse mount options 20:08:15 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:15 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:16 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 231.537561][T14631] befs: Unrecognized mount option "audit" or missing value [ 231.546675][T14631] befs: (loop1): cannot parse mount options 20:08:16 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:16 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 231.719350][T14641] befs: Unrecognized mount option "audit" or missing value [ 231.727410][T14641] befs: (loop1): cannot parse mount options [ 231.796549][T14641] befs: Unrecognized mount option "audit" or missing value [ 231.906475][T14641] befs: (loop1): cannot parse mount options 20:08:16 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:16 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 232.173106][T14655] befs: Unrecognized mount option "audit" or missing value [ 232.218954][T14655] befs: (loop1): cannot parse mount options [ 232.356426][T14655] befs: Unrecognized mount option "audit" or missing value 20:08:16 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:16 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 232.435282][T14655] befs: (loop1): cannot parse mount options 20:08:16 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:17 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 232.659513][T14674] befs: Unrecognized mount option "audit" or missing value [ 232.700653][T14674] befs: (loop1): cannot parse mount options [ 232.765470][T14674] befs: Unrecognized mount option "audit" or missing value [ 232.779585][T14674] befs: (loop1): cannot parse mount options 20:08:17 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:17 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 232.931057][T14684] befs: Unrecognized mount option "audit" or missing value [ 232.977521][T14684] befs: (loop1): cannot parse mount options [ 233.099071][T14684] befs: Unrecognized mount option "audit" or missing value [ 233.110672][T14684] befs: (loop1): cannot parse mount options 20:08:17 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:17 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 233.210006][T14695] befs: Unrecognized mount option "audit" or missing value [ 233.217693][T14695] befs: (loop1): cannot parse mount options 20:08:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 233.257876][T14695] befs: Unrecognized mount option "audit" or missing value [ 233.278102][T14695] befs: (loop1): cannot parse mount options 20:08:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:17 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:17 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 233.481930][T14711] befs: Unrecognized mount option "audit" or missing value [ 233.498990][T14711] befs: (loop1): cannot parse mount options [ 233.566884][T14711] befs: Unrecognized mount option "audit" or missing value [ 233.576289][T14711] befs: (loop1): cannot parse mount options 20:08:18 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:18 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 233.773527][T14721] befs: Unrecognized mount option "audit" or missing value [ 233.790176][T14721] befs: (loop1): cannot parse mount options [ 233.844096][T14721] befs: Unrecognized mount option "audit" or missing value [ 233.858187][T14721] befs: (loop1): cannot parse mount options 20:08:18 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:18 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe40b000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 234.036799][T14733] befs: Unrecognized mount option "audit" or missing value [ 234.047640][T14733] befs: (loop1): cannot parse mount options [ 234.118522][T14733] befs: Unrecognized mount option "audit" or missing value [ 234.127259][T14733] befs: (loop1): cannot parse mount options 20:08:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:18 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xe50b000000000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:18 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 234.348627][T14749] befs: Unrecognized mount option "audit" or missing value [ 234.373069][T14749] befs: (loop1): cannot parse mount options [ 234.440717][T14749] befs: Unrecognized mount option "audit" or missing value [ 234.448048][T14749] befs: (loop1): cannot parse mount options 20:08:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 234.642342][T14760] befs: Unrecognized mount option "audit" or missing value [ 234.664946][T14760] befs: (loop1): cannot parse mount options 20:08:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xf9fdffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 234.739338][T14760] befs: Unrecognized mount option "audit" or missing value [ 234.746830][T14760] befs: (loop1): cannot parse mount options [ 234.850208][T14768] befs: Unrecognized mount option "audit" or missing value [ 234.858195][T14768] befs: (loop1): cannot parse mount options [ 234.910172][T14768] befs: Unrecognized mount option "audit" or missing value [ 234.918176][T14768] befs: (loop1): cannot parse mount options 20:08:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 235.035088][T14779] befs: Unrecognized mount option "audit" or missing value [ 235.078856][T14779] befs: (loop1): cannot parse mount options 20:08:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:19 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 235.175727][T14779] befs: Unrecognized mount option "audit" or missing value [ 235.194260][T14779] befs: (loop1): cannot parse mount options 20:08:19 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 235.390451][T14795] befs: Unrecognized mount option "audit" or missing value [ 235.408059][T14795] befs: (loop1): cannot parse mount options 20:08:19 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 235.497644][T14795] befs: Unrecognized mount option "audit" or missing value 20:08:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 235.554819][T14795] befs: (loop1): cannot parse mount options 20:08:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 235.805007][T14809] befs: Unrecognized mount option "audit" or missing value [ 235.817400][T14809] befs: (loop1): cannot parse mount options 20:08:20 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 235.879974][T14809] befs: Unrecognized mount option "audit" or missing value [ 235.900641][T14809] befs: (loop1): cannot parse mount options 20:08:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:20 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, 0x0, 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 236.058515][T14821] befs: Unrecognized mount option "audit" or missing value [ 236.114121][T14821] befs: (loop1): cannot parse mount options 20:08:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 236.331912][T14830] befs: Unrecognized mount option "audit" or missing value [ 236.347585][T14830] befs: (loop1): cannot parse mount options 20:08:20 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 236.403486][T14830] befs: Unrecognized mount option "audit" or missing value [ 236.411732][T14830] befs: (loop1): cannot parse mount options 20:08:20 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 236.557702][T14845] befs: Unrecognized mount option "audit" or missing value [ 236.567432][T14845] befs: (loop1): cannot parse mount options [ 236.626854][T14845] befs: Unrecognized mount option "audit" or missing value [ 236.637061][T14845] befs: (loop1): cannot parse mount options 20:08:21 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:21 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 236.835108][T14855] befs: Unrecognized mount option "audit" or missing value [ 236.855366][T14855] befs: (loop1): cannot parse mount options 20:08:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 236.921816][ T34] audit: type=1804 audit(1603570101.345:22): pid=14862 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir191170391/syzkaller.wuCBCN/112/bus" dev="sda1" ino=16014 res=1 errno=0 [ 236.948417][T14855] befs: Unrecognized mount option "audit" or missing value 20:08:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 236.984619][T14855] befs: (loop1): cannot parse mount options 20:08:21 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 237.149409][T14871] befs: Unrecognized mount option "audit" or missing value [ 237.160612][T14871] befs: (loop1): cannot parse mount options 20:08:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 237.216182][T14871] befs: Unrecognized mount option "audit" or missing value [ 237.223776][T14871] befs: (loop1): cannot parse mount options 20:08:21 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 237.387431][T14885] befs: Unrecognized mount option "audit" or missing value [ 237.395460][T14885] befs: (loop1): cannot parse mount options [ 237.455011][T14885] befs: Unrecognized mount option "audit" or missing value [ 237.462561][T14885] befs: (loop1): cannot parse mount options 20:08:21 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 237.592549][T14893] befs: Unrecognized mount option "audit" or missing value [ 237.599833][T14893] befs: (loop1): cannot parse mount options 20:08:22 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 237.697756][T14893] befs: Unrecognized mount option "audit" or missing value [ 237.719212][T14893] befs: (loop1): cannot parse mount options 20:08:22 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 237.824214][ T34] audit: type=1804 audit(1603570102.245:23): pid=14902 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir191170391/syzkaller.wuCBCN/113/bus" dev="sda1" ino=16010 res=1 errno=0 [ 237.900279][T14909] befs: Unrecognized mount option "audit" or missing value [ 237.909996][T14909] befs: (loop1): cannot parse mount options [ 237.996766][T14909] befs: Unrecognized mount option "audit" or missing value [ 238.004988][T14909] befs: (loop1): cannot parse mount options 20:08:22 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:22 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x9, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 238.120514][T14920] befs: Unrecognized mount option "audit" or missing value [ 238.128073][T14920] befs: (loop1): cannot parse mount options [ 238.193857][T14920] befs: Unrecognized mount option "audit" or missing value [ 238.220691][T14920] befs: (loop1): cannot parse mount options 20:08:22 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 238.336715][T14929] befs: Unrecognized mount option "audit" or missing value [ 238.344284][T14929] befs: (loop1): cannot parse mount options 20:08:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 238.392628][T14929] befs: Unrecognized mount option "audit" or missing value [ 238.400145][T14929] befs: (loop1): cannot parse mount options 20:08:22 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:23 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 238.584383][T14938] befs: Unrecognized mount option "audit" or missing value [ 238.608072][T14938] befs: (loop1): cannot parse mount options [ 238.675390][T14938] befs: Unrecognized mount option "audit" or missing value [ 238.686181][T14938] befs: (loop1): cannot parse mount options 20:08:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 238.719075][ T34] audit: type=1804 audit(1603570103.135:24): pid=14947 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir191170391/syzkaller.wuCBCN/114/bus" dev="sda1" ino=16271 res=1 errno=0 20:08:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 238.888549][T14953] befs: Unrecognized mount option "audit" or missing value [ 238.903601][T14953] befs: (loop1): cannot parse mount options 20:08:23 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 238.953850][T14953] befs: Unrecognized mount option "audit" or missing value [ 238.965590][T14953] befs: (loop1): cannot parse mount options 20:08:23 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 239.147139][T14967] befs: Unrecognized mount option "audit" or missing value [ 239.156036][T14967] befs: (loop1): cannot parse mount options [ 239.214377][T14967] befs: Unrecognized mount option "audit" or missing value [ 239.221997][T14967] befs: (loop1): cannot parse mount options 20:08:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 239.382213][T14976] befs: Unrecognized mount option "audit" or missing value [ 239.389764][T14976] befs: (loop1): cannot parse mount options [ 239.438405][T14976] befs: Unrecognized mount option "audit" or missing value [ 239.447594][T14976] befs: (loop1): cannot parse mount options 20:08:23 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:23 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 239.529179][T14982] befs: Unrecognized mount option "audit" or missing value [ 239.536614][T14982] befs: (loop1): cannot parse mount options 20:08:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x11, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 239.629019][T14982] befs: Unrecognized mount option "audit" or missing value [ 239.636704][T14982] befs: (loop1): cannot parse mount options 20:08:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:24 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 239.737704][T14993] befs: Unrecognized mount option "audit" or missing value [ 239.747631][T14993] befs: (loop1): cannot parse mount options [ 239.802892][T14993] befs: Unrecognized mount option "audit" or missing value [ 239.817249][T14993] befs: (loop1): cannot parse mount options 20:08:24 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x12, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:24 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 239.946554][T15008] befs: Unrecognized mount option "audit" or missing value [ 239.960635][T15008] befs: (loop1): cannot parse mount options [ 240.002548][T15008] befs: Unrecognized mount option "audit" or missing value [ 240.017849][T15008] befs: (loop1): cannot parse mount options 20:08:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1a, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 240.168493][T15018] befs: Unrecognized mount option "audit" or missing value [ 240.188625][T15018] befs: (loop1): cannot parse mount options [ 240.282995][T15018] befs: Unrecognized mount option "audit" or missing value [ 240.292779][T15018] befs: (loop1): cannot parse mount options 20:08:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:24 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1b, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 240.437842][T15030] befs: Unrecognized mount option "audit" or missing value [ 240.473056][T15030] befs: (loop1): cannot parse mount options 20:08:24 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 240.551058][T15030] befs: Unrecognized mount option "audit" or missing value [ 240.572299][T15030] befs: (loop1): cannot parse mount options 20:08:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 240.730624][T15044] befs: Unrecognized mount option "audit" or missing value [ 240.740213][T15044] befs: (loop1): cannot parse mount options 20:08:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x25, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:25 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:25 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 240.942931][T15053] befs: Unrecognized mount option "audit" or missing value [ 240.957087][T15053] befs: (loop1): cannot parse mount options [ 241.007783][T15053] befs: Unrecognized mount option "audit" or missing value [ 241.025290][T15053] befs: (loop1): cannot parse mount options 20:08:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 241.319114][T15069] befs: Unrecognized mount option "audit" or missing value 20:08:25 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 241.392224][T15069] befs: (loop1): cannot parse mount options 20:08:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:25 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 241.616372][T15077] befs: Unrecognized mount option "audit" or missing value [ 241.630734][T15077] befs: (loop1): cannot parse mount options [ 241.693972][T15077] befs: Unrecognized mount option "audit" or missing value [ 241.702969][T15077] befs: (loop1): cannot parse mount options 20:08:26 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:26 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:26 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x60, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 241.907838][T15094] befs: Unrecognized mount option "audit" or missing value [ 241.916514][T15094] befs: (loop1): cannot parse mount options [ 241.975025][T15094] befs: Unrecognized mount option "audit" or missing value [ 241.982450][T15094] befs: (loop1): cannot parse mount options 20:08:26 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x68, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 242.131968][T15102] befs: Unrecognized mount option "audit" or missing value [ 242.150626][T15102] befs: (loop1): cannot parse mount options 20:08:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 242.230076][T15102] befs: Unrecognized mount option "audit" or missing value [ 242.243126][T15102] befs: (loop1): cannot parse mount options 20:08:26 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:26 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 242.411560][T15112] befs: Unrecognized mount option "audit" or missing value [ 242.429983][T15112] befs: (loop1): cannot parse mount options [ 242.509225][T15112] befs: Unrecognized mount option "audit" or missing value [ 242.526223][T15112] befs: (loop1): cannot parse mount options [ 242.547795][ T34] audit: type=1804 audit(1603570106.965:25): pid=15123 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir701218404/syzkaller.HXAghv/120/bus" dev="sda1" ino=15860 res=1 errno=0 20:08:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:27 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 242.707704][T15127] befs: Unrecognized mount option "audit" or missing value [ 242.729054][T15127] befs: (loop1): cannot parse mount options [ 242.793719][T15127] befs: Unrecognized mount option "audit" or missing value [ 242.803925][T15127] befs: (loop1): cannot parse mount options 20:08:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 242.965557][T15141] befs: Unrecognized mount option "audit" or missing value [ 242.989359][T15141] befs: (loop1): cannot parse mount options [ 243.065041][T15141] befs: Unrecognized mount option "audit" or missing value [ 243.087850][T15141] befs: (loop1): cannot parse mount options 20:08:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 243.222965][T15152] befs: Unrecognized mount option "audit" or missing value [ 243.230485][T15152] befs: (loop1): cannot parse mount options 20:08:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:27 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 243.284789][T15152] befs: Unrecognized mount option "audit" or missing value [ 243.301663][T15152] befs: (loop1): cannot parse mount options 20:08:27 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 243.463324][ T34] audit: type=1804 audit(1603570107.885:26): pid=15165 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir701218404/syzkaller.HXAghv/121/bus" dev="sda1" ino=15809 res=1 errno=0 [ 243.472030][T15163] befs: Unrecognized mount option "audit" or missing value [ 243.496281][T15163] befs: (loop1): cannot parse mount options 20:08:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 243.706982][T15177] befs: Unrecognized mount option "audit" or missing value [ 243.715597][T15177] befs: (loop1): cannot parse mount options [ 243.777291][T15177] befs: Unrecognized mount option "audit" or missing value [ 243.785137][T15177] befs: (loop1): cannot parse mount options 20:08:28 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 244.016362][T15188] befs: Unrecognized mount option "audit" or missing value [ 244.030851][T15188] befs: (loop1): cannot parse mount options 20:08:28 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 244.175623][T15188] befs: Unrecognized mount option "audit" or missing value [ 244.184333][T15188] befs: (loop1): cannot parse mount options 20:08:28 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 244.371049][T15196] befs: Unrecognized mount option "audit" or missing value [ 244.382238][T15196] befs: (loop1): cannot parse mount options 20:08:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:28 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 244.444123][ T34] audit: type=1804 audit(1603570108.865:27): pid=15207 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir701218404/syzkaller.HXAghv/122/bus" dev="sda1" ino=16097 res=1 errno=0 [ 244.577020][T15196] befs: Unrecognized mount option "audit" or missing value [ 244.599447][T15196] befs: (loop1): cannot parse mount options 20:08:29 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 244.789848][T15218] befs: Unrecognized mount option "audit" or missing value [ 244.797146][T15218] befs: (loop1): cannot parse mount options [ 244.888386][T15218] befs: Unrecognized mount option "audit" or missing value [ 244.904053][T15218] befs: (loop1): cannot parse mount options 20:08:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:29 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xb00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:29 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 245.151693][T15230] befs: Unrecognized mount option "audit" or missing value [ 245.161523][T15230] befs: (loop1): cannot parse mount options 20:08:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:29 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:29 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xbe4, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:29 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 245.569716][T15247] befs: Unrecognized mount option "audit" or missing value 20:08:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 245.648886][T15247] befs: (loop1): cannot parse mount options [ 245.740666][T15247] befs: Unrecognized mount option "audit" or missing value [ 245.748035][T15247] befs: (loop1): cannot parse mount options 20:08:30 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:30 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xbe5, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 245.929216][T15263] befs: Unrecognized mount option "audit" or missing value [ 245.951890][T15263] befs: (loop1): cannot parse mount options [ 246.037790][T15263] befs: Unrecognized mount option "audit" or missing value [ 246.053034][T15263] befs: (loop1): cannot parse mount options 20:08:30 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:30 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 246.327854][T15273] befs: Unrecognized mount option "audit" or missing value [ 246.336132][T15273] befs: (loop1): cannot parse mount options 20:08:30 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:31 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xd00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 246.779142][T15295] befs: Unrecognized mount option "audit" or missing value [ 246.809243][T15295] befs: (loop1): cannot parse mount options 20:08:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:31 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:31 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:31 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 247.377983][T15312] befs: Unrecognized mount option "audit" or missing value [ 247.385748][T15312] befs: (loop1): cannot parse mount options 20:08:31 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 247.538245][T15312] befs: Unrecognized mount option "audit" or missing value [ 247.546806][T15312] befs: (loop1): cannot parse mount options [ 247.637567][T15324] befs: Unrecognized mount option "audit" or missing value [ 247.645155][T15324] befs: (loop1): cannot parse mount options 20:08:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 247.750852][T15324] befs: Unrecognized mount option "audit" or missing value [ 247.758139][T15324] befs: (loop1): cannot parse mount options 20:08:32 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1100, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:32 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 247.989091][T15337] befs: Unrecognized mount option "audit" or missing value 20:08:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 248.046848][T15337] befs: (loop1): cannot parse mount options 20:08:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:32 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 248.193679][T15337] befs: Unrecognized mount option "audit" or missing value [ 248.201029][T15337] befs: (loop1): cannot parse mount options 20:08:32 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1200, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 248.365760][T15355] befs: Unrecognized mount option "audit" or missing value [ 248.406976][T15355] befs: (loop1): cannot parse mount options 20:08:32 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 248.555789][T15355] befs: Unrecognized mount option "audit" or missing value [ 248.580665][T15355] befs: (loop1): cannot parse mount options 20:08:33 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1a00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 248.874841][T15371] befs: Unrecognized mount option "audit" or missing value [ 248.939941][T15371] befs: (loop1): cannot parse mount options 20:08:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:33 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:33 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1b00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:33 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 249.362246][T15390] befs: Unrecognized mount option "audit" or missing value [ 249.369485][T15390] befs: (loop1): cannot parse mount options 20:08:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 249.865602][T15400] befs: Unrecognized mount option "audit" or missing value [ 249.891506][T15400] befs: (loop1): cannot parse mount options 20:08:34 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:34 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:34 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:34 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 250.289968][T15419] befs: Unrecognized mount option "audit" or missing value [ 250.300565][T15419] befs: (loop1): cannot parse mount options 20:08:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:34 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:35 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 250.698023][T15429] befs: Unrecognized mount option "audit" or missing value [ 250.718548][T15429] befs: (loop1): cannot parse mount options 20:08:35 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r1, &(0x7f0000000240), 0x7fff) 20:08:35 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2500, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:35 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 251.233016][T15448] befs: Unrecognized mount option "audit" or missing value [ 251.252013][T15448] befs: (loop1): cannot parse mount options 20:08:35 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:36 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:36 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r1, &(0x7f0000000240), 0x7fff) [ 251.809821][T15459] befs: Unrecognized mount option "audit" or missing value [ 251.825370][T15459] befs: (loop1): cannot parse mount options 20:08:36 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:36 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 252.172939][T15477] befs: Unrecognized mount option "audit" or missing value [ 252.182423][T15477] befs: (loop1): cannot parse mount options 20:08:36 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 252.533242][T15484] befs: Unrecognized mount option "audit" or missing value [ 252.546479][T15484] befs: (loop1): cannot parse mount options 20:08:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, 0x0, 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:37 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:37 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(0xffffffffffffffff, r1, &(0x7f0000000240), 0x7fff) 20:08:37 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 253.013685][T15499] befs: Unrecognized mount option "audit" or missing value [ 253.027972][T15499] befs: (loop1): cannot parse mount options 20:08:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:37 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:37 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, 0x0, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, 0x0, 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 253.699064][T15512] befs: Unrecognized mount option "audit" or missing value [ 253.709096][T15512] befs: (loop1): cannot parse mount options 20:08:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:38 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, 0x0, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 254.285112][T15536] befs: Unrecognized mount option "audit" or missing value [ 254.300591][T15536] befs: (loop1): cannot parse mount options 20:08:38 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:38 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, 0x0, 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, 0x0, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 254.870399][T15549] befs: Unrecognized mount option "audit" or missing value [ 254.902335][T15549] befs: (loop1): cannot parse mount options 20:08:39 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:39 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 255.703153][T15569] befs: Unrecognized mount option "audit" or missing value [ 255.718787][T15569] befs: (loop1): cannot parse mount options 20:08:40 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:40 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 256.260706][ T16] Bluetooth: hci0: command 0x0406 tx timeout [ 256.267778][ T16] Bluetooth: hci1: command 0x0406 tx timeout [ 256.290972][ T16] Bluetooth: hci2: command 0x0406 tx timeout [ 256.298331][ T16] Bluetooth: hci3: command 0x0406 tx timeout 20:08:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, 0x0, 0x7fff) 20:08:40 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 256.306299][ T16] Bluetooth: hci4: command 0x0406 tx timeout [ 256.313303][ T16] Bluetooth: hci5: command 0x0406 tx timeout 20:08:40 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 256.572441][T15594] befs: Unrecognized mount option "audit" or missing value [ 256.579760][T15594] befs: (loop1): cannot parse mount options 20:08:41 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:41 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:41 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, 0x0, 0x7fff) 20:08:41 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) [ 257.415202][T15614] befs: Unrecognized mount option "audit" or missing value [ 257.436330][T15614] befs: (loop1): cannot parse mount options 20:08:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:42 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe40b, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:42 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, 0x0, 0x7fff) 20:08:42 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(0x0, 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:42 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:42 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:43 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe50b, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:43 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:43 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x0) 20:08:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(0x0, 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:43 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:43 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:44 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:44 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:44 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(0x0, 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:44 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x0) 20:08:44 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:44 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:44 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:45 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) [ 260.751890][ T34] audit: type=1804 audit(1603570125.175:28): pid=15717 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/172/bus" dev="sda1" ino=15827 res=1 errno=0 20:08:45 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x0) [ 260.848971][ T34] audit: type=1804 audit(1603570125.205:29): pid=15718 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/172/bus" dev="sda1" ino=15827 res=1 errno=0 20:08:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:45 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:45 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 261.445784][ T34] audit: type=1804 audit(1603570125.865:30): pid=15736 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/173/bus" dev="sda1" ino=15773 res=1 errno=0 [ 261.563946][ T34] audit: type=1804 audit(1603570125.895:31): pid=15738 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/173/bus" dev="sda1" ino=15773 res=1 errno=0 20:08:46 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:46 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:46 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:46 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:46 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 262.318688][ T34] audit: type=1804 audit(1603570126.735:32): pid=15758 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/174/bus" dev="sda1" ino=15816 res=1 errno=0 [ 262.343635][ T34] audit: type=1804 audit(1603570126.735:33): pid=15758 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/174/bus" dev="sda1" ino=15816 res=1 errno=0 20:08:47 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x80040, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200005, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:48 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:49 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:49 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:49 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:49 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000800"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:50 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:50 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe0ffff, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:50 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:50 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 266.038192][ T34] audit: type=1804 audit(1603570130.455:34): pid=15846 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/178/bus" dev="sda1" ino=15774 res=1 errno=0 20:08:50 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 266.230616][ T34] audit: type=1804 audit(1603570130.645:35): pid=15855 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/179/bus" dev="sda1" ino=15774 res=1 errno=0 20:08:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:50 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x0, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:51 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, &(0x7f0000001380), 0x0, &(0x7f0000001440)={[{}], [{@audit='audit'}]}) 20:08:51 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/11], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:08:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 20:08:51 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 20:08:51 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 267.183521][ T34] audit: type=1804 audit(1603570131.605:36): pid=15877 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir712077585/syzkaller.3mHu3N/180/bus" dev="sda1" ino=15828 res=1 errno=0 20:08:51 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x65) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x65) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x0, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x3d}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7b}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xff00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x24008894) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 267.463524][T15874] ================================================================== [ 267.471645][T15874] BUG: KCSAN: data-race in __blk_mq_sched_dispatch_requests / blk_mq_run_hw_queue [ 267.480818][T15874] [ 267.483141][T15874] write to 0xffff888102e22410 of 8 bytes by task 2975 on cpu 0: [ 267.490774][T15874] __blk_mq_sched_dispatch_requests+0x16a/0x2a0 [ 267.497012][T15874] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 267.502899][T15874] __blk_mq_run_hw_queue+0xee/0x1c0 [ 267.508096][T15874] __blk_mq_delay_run_hw_queue+0x17d/0x330 [ 267.513896][T15874] blk_mq_run_hw_queue+0x231/0x260 [ 267.519005][T15874] blk_mq_requeue_work+0x423/0x490 [ 267.524105][T15874] process_one_work+0x3e1/0x950 [ 267.529056][T15874] worker_thread+0x635/0xb90 [ 267.533632][T15874] kthread+0x1fa/0x220 [ 267.537693][T15874] ret_from_fork+0x1f/0x30 [ 267.542092][T15874] [ 267.544418][T15874] read to 0xffff888102e22410 of 8 bytes by task 15874 on cpu 1: [ 267.552047][T15874] blk_mq_run_hw_queue+0x12e/0x260 [ 267.557153][T15874] blk_mq_submit_bio+0xd0d/0x1020 [ 267.562173][T15874] submit_bio_noacct+0x77d/0x930 [ 267.567094][T15874] submit_bio+0x1f3/0x360 [ 267.571419][T15874] submit_bio_wait+0x79/0xc0 [ 267.576001][T15874] blkdev_issue_flush+0xc3/0xe0 [ 267.580894][T15874] ext4_sync_file+0x3e1/0x6a0 [ 267.585587][T15874] vfs_fsync_range+0x107/0x120 [ 267.590343][T15874] ext4_buffered_write_iter+0x384/0x3d0 [ 267.595895][T15874] ext4_file_write_iter+0x45e/0x1090 [ 267.601207][T15874] do_iter_readv_writev+0x2cb/0x360 [ 267.606395][T15874] do_iter_write+0x112/0x4b0 [ 267.611063][T15874] vfs_iter_write+0x4c/0x70 [ 267.615554][T15874] iter_file_splice_write+0x42a/0x780 [ 267.620915][T15874] direct_splice_actor+0x80/0xa0 [ 267.625845][T15874] splice_direct_to_actor+0x345/0x650 [ 267.631227][T15874] do_splice_direct+0xf5/0x170 [ 267.636008][T15874] do_sendfile+0x574/0xb70 [ 267.640414][T15874] __x64_sys_sendfile64+0xa9/0x130 [ 267.645536][T15874] do_syscall_64+0x39/0x80 [ 267.649942][T15874] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.655813][T15874] [ 267.658129][T15874] Reported by Kernel Concurrency Sanitizer on: [ 267.664279][T15874] CPU: 1 PID: 15874 Comm: syz-executor.2 Not tainted 5.9.0-syzkaller #0 [ 267.672595][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.682642][T15874] ================================================================== [ 267.690702][T15874] Kernel panic - not syncing: panic_on_warn set ... [ 267.697283][T15874] CPU: 1 PID: 15874 Comm: syz-executor.2 Not tainted 5.9.0-syzkaller #0 [ 267.705615][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.715677][T15874] Call Trace: [ 267.718968][T15874] dump_stack+0x116/0x15d [ 267.723321][T15874] panic+0x1e7/0x5fa [ 267.727224][T15874] ? vprintk_emit+0x2f2/0x370 [ 267.731900][T15874] kcsan_report+0x67b/0x680 [ 267.736398][T15874] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 267.741931][T15874] ? blk_mq_run_hw_queue+0x12e/0x260 [ 267.747206][T15874] ? blk_mq_submit_bio+0xd0d/0x1020 [ 267.752398][T15874] ? submit_bio_noacct+0x77d/0x930 [ 267.757505][T15874] ? submit_bio+0x1f3/0x360 [ 267.762006][T15874] ? submit_bio_wait+0x79/0xc0 [ 267.766764][T15874] ? blkdev_issue_flush+0xc3/0xe0 [ 267.771805][T15874] ? ext4_sync_file+0x3e1/0x6a0 [ 267.776660][T15874] ? vfs_fsync_range+0x107/0x120 [ 267.781598][T15874] ? ext4_buffered_write_iter+0x384/0x3d0 [ 267.787353][T15874] ? ext4_file_write_iter+0x45e/0x1090 [ 267.792816][T15874] ? do_iter_readv_writev+0x2cb/0x360 [ 267.798626][T15874] ? do_iter_write+0x112/0x4b0 [ 267.803382][T15874] ? vfs_iter_write+0x4c/0x70 [ 267.808054][T15874] ? iter_file_splice_write+0x42a/0x780 [ 267.813594][T15874] ? direct_splice_actor+0x80/0xa0 [ 267.818698][T15874] ? splice_direct_to_actor+0x345/0x650 [ 267.824231][T15874] ? do_splice_direct+0xf5/0x170 [ 267.829160][T15874] ? do_sendfile+0x574/0xb70 [ 267.833741][T15874] ? __x64_sys_sendfile64+0xa9/0x130 [ 267.839020][T15874] ? do_syscall_64+0x39/0x80 [ 267.843603][T15874] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.849670][T15874] ? ktime_get+0x1b0/0x1e0 [ 267.854074][T15874] ? __list_del_entry_valid+0x54/0xc0 [ 267.859441][T15874] kcsan_setup_watchpoint+0x46a/0x4d0 [ 267.864812][T15874] blk_mq_run_hw_queue+0x12e/0x260 [ 267.869918][T15874] blk_mq_submit_bio+0xd0d/0x1020 [ 267.874936][T15874] submit_bio_noacct+0x77d/0x930 [ 267.879896][T15874] ? mempool_alloc+0x6d/0x2c0 [ 267.884561][T15874] submit_bio+0x1f3/0x360 [ 267.888895][T15874] ? bio_associate_blkg_from_css+0x627/0x6d0 [ 267.894865][T15874] submit_bio_wait+0x79/0xc0 [ 267.899542][T15874] blkdev_issue_flush+0xc3/0xe0 [ 267.904388][T15874] ext4_sync_file+0x3e1/0x6a0 [ 267.909056][T15874] ? tsan.module_ctor+0x10/0x10 [ 267.913929][T15874] vfs_fsync_range+0x107/0x120 [ 267.918690][T15874] ext4_buffered_write_iter+0x384/0x3d0 [ 267.924230][T15874] ext4_file_write_iter+0x45e/0x1090 [ 267.929511][T15874] ? pagecache_get_page+0x849/0x980 [ 267.934706][T15874] do_iter_readv_writev+0x2cb/0x360 [ 267.939903][T15874] do_iter_write+0x112/0x4b0 [ 267.944487][T15874] ? kmalloc_array+0x2d/0x40 [ 267.949070][T15874] vfs_iter_write+0x4c/0x70 [ 267.953570][T15874] iter_file_splice_write+0x42a/0x780 [ 267.958966][T15874] ? splice_from_pipe+0xc0/0xc0 [ 267.963811][T15874] direct_splice_actor+0x80/0xa0 [ 267.968744][T15874] splice_direct_to_actor+0x345/0x650 [ 267.974112][T15874] ? do_splice_direct+0x170/0x170 [ 267.979127][T15874] do_splice_direct+0xf5/0x170 [ 267.983923][T15874] do_sendfile+0x574/0xb70 [ 267.988363][T15874] __x64_sys_sendfile64+0xa9/0x130 [ 267.993474][T15874] do_syscall_64+0x39/0x80 [ 267.997911][T15874] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 268.003795][T15874] RIP: 0033:0x45de59 [ 268.007682][T15874] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.027280][T15874] RSP: 002b:00007f361a813c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 268.035717][T15874] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de59 [ 268.043712][T15874] RDX: 0000000020000240 RSI: 0000000000000005 RDI: 0000000000000005 [ 268.051675][T15874] RBP: 000000000118bf68 R08: 0000000000000000 R09: 0000000000000000 [ 268.059659][T15874] R10: 0000000000007fff R11: 0000000000000246 R12: 000000000118bf2c [ 268.067649][T15874] R13: 00007ffc620b7fbf R14: 00007f361a8149c0 R15: 000000000118bf2c [ 268.076125][T15874] Kernel Offset: disabled [ 268.080439][T15874] Rebooting in 86400 seconds..