, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) [ 563.123279] IPVS: ftp: loaded support on port[0] = 21 [ 563.135428] hfs: umask requires a value [ 563.142619] IPVS: ftp: loaded support on port[0] = 21 13:46:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x260, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 563.176983] hfs: unable to parse mount options 13:46:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$rose(r1, &(0x7f0000000040)=@full={0xb, @remote, @rose, 0x0, [@remote, @netrom, @default, @rose, @remote, @rose]}, &(0x7f0000000080)=0x40, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d61736b3d303030303030103030303030326d2c00f8ffffff0000000e00"]) 13:46:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x2000, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 563.510484] hfs: unable to parse mount options 13:46:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x2, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 563.551349] IPVS: ftp: loaded support on port[0] = 21 13:46:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x4, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x24004, &(0x7f0000000940)={[{@quiet='quiet'}]}) 13:46:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:32 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x39, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:32 executing program 3: unshare(0x40000000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x24000, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x600000d, 0x4000010, r0, 0xb81b2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000540)=ANY=[], 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f0000000000)) 13:46:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c0000000000000040000000000000"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x5, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 563.984835] IPVS: ftp: loaded support on port[0] = 21 [ 563.999358] IPVS: ftp: loaded support on port[0] = 21 13:46:33 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x11, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x1d, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:33 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) iopl(0x5) sendto$inet(r4, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0x58, &(0x7f0000000040)=[@in={0x2, 0x4e21, @private=0xa010102}, @in6={0xa, 0x4e22, 0x8, @empty}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e22, 0xffffffff, @private0, 0xffff}]}, &(0x7f0000000100)=0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r8, @ANYBLOB='^\b']) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x203008, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030300100000032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,max_read=0x0000000000007fff,blksize=0x0000000000000600,allow_other,blksize=0x8b99d9aa07b5cc61,default_permissions,blksize=0x0000000000000200,pcr=00000000000000000062,obj_user=/,audit,appraise_type=imasig,\x00']) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 564.342144] IPVS: ftp: loaded support on port[0] = 21 13:46:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x2000, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:33 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 564.581221] jfs: Unrecognized mount option "gid=0x00000000ffffffff^" or missing value [ 564.721827] hfs: umask requires a value [ 564.729781] hfs: unable to parse mount options 13:46:34 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x3a, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x8000000, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/253], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf0}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:34 executing program 3: ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000000c0)=0x8) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) fstatfs(r2, &(0x7f0000000500)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000540)=ANY=[], 0x41) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000001500)={0x1, 0x80000000}) ioctl$PPPIOCSFLAGS1(r4, 0x40047457, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000001540), 0xc, &(0x7f0000001780)={&(0x7f0000001580)=ANY=[@ANYBLOB="d0000000", @ANYRESOCT, @ANYRESOCT=r5, @ANYRES32=0x0, @ANYBLOB="1400020076657468305f766972745f776966690020000180140002006d61637365633000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="5000018008000300030000001400020073797a5f74756e000000000000000000080003000300000008000100", @ANYRES16=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="e797fbbf", @ANYRES32=0x0, @ANYBLOB="00800000516601e0c80c3f7e4e7eb87ea1c088236dbbf817760df81c449732fef613621b7a403115f22bede61cd364153e3c206758d166d835829fb35aa053d0bd3533223bf917efe44827e2055fb3509de72e629616244fc881e4a101f33f5711f2535fe41021a2f7b6e3d78e742c07f4a8403b137caf32b550b0f114a860337fa4ace0baa5362abfe660d2c961975fc033db", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x400a000}, 0x8000) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000002c0)={0x1f, "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"}) [ 565.086631] IPVS: ftp: loaded support on port[0] = 21 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0xffffffff, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 565.113466] IPVS: ftp: loaded support on port[0] = 21 13:46:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x120}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 565.260010] jfs: Unrecognized mount option "gid=0x00000000ffffffff^" or missing value 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xab}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) dup2(0xffffffffffffffff, r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xad}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x1ab}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 565.548464] hfs: umask requires a value 13:46:34 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x3b, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) [ 565.580252] hfs: unable to parse mount options [ 565.635513] IPVS: ftp: loaded support on port[0] = 21 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0xa}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x300}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/253], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0xb}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 565.923995] IPVS: ftp: loaded support on port[0] = 21 13:46:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="0907000000000000000017"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x54, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x3ff}, {0x5, 0x12, 0x1}}]}, 0x54}}, 0x4000000) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffffffff) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r5, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) sendfile(r4, r5, 0x0, 0x200) 13:46:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x500}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0xc}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:35 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x498101, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000540)=ANY=[], 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x9, 0x2000) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r8, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x224, r8, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x55}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x15c6372e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xf3f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0xa8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x90, 0x3, "e32385c767656bdf56fde96cbc9f9e23a754f92928c064c732b5757c6815ab3f04def7dbf1ebb055d1a4b958264d04db45e83d5ac9e0eec0dd0d59860b8f6a0c7d27332fe113765196320c8d3cb49872afeebad4a2aa726f37f124674096d628c238d7fef32bb3475aa7b627a26e843c4fc84b50f29dcd5c452cb9dc26ae915816e4c87244f0bfd66b7f8b62"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xd6f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xf2ef}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9a4f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x477}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x24044840}, 0x40090) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) 13:46:35 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0xd}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 566.443264] hfs: umask requires a value [ 566.455805] hfs: unable to parse mount options [ 566.540713] IPVS: ftp: loaded support on port[0] = 21 [ 566.551295] IPVS: ftp: loaded support on port[0] = 21 13:46:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@dont_hash='dont_hash'}, {@measure='measure'}, {@fowner_gt={'fowner>'}}]}) 13:46:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x600}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0xa}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 566.710907] hfs: umask requires a value [ 566.735330] hfs: unable to parse mount options 13:46:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/253], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x900}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_REWIND(0xffffffffffffffff, 0x40084146, &(0x7f00000000c0)=0x7f) r1 = dup(r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x9) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040), 0x4) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d613030303030b22298a95d45f8140a6d5325fde81fa7eb47"]) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r7, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000180)={0x8, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0xe, 0x0, 0x8000}, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r5, 0x0, 0xa, &(0x7f0000000100)='/dev/zero\x00', r8}, 0x30) 13:46:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0xb}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 566.994783] hfs: unable to parse mount options 13:46:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0xc}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xa00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 567.165321] hfs: unable to parse mount options [ 567.179731] IPVS: ftp: loaded support on port[0] = 21 13:46:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0xd}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:36 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x3d, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:36 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[], 0x41) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000480)=ANY=[], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) 13:46:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xb00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/257], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 567.719702] IPVS: ftp: loaded support on port[0] = 21 [ 567.728176] hfs: umask requires a value [ 567.739897] IPVS: ftp: loaded support on port[0] = 21 [ 567.746660] hfs: unable to parse mount options 13:46:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0x14, 0xa9}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x800, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) fstat(r0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f00000001c0)=&(0x7f0000000180)) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/503]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = openat(r6, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000140)={0xffffffffffff2556, 0x11, 0x1, r9}) 13:46:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xc00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local={0xac, 0x14, 0x14, 0xab}, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 568.027791] hfs: unable to parse mount options 13:46:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xe00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 568.207456] hfs: unable to parse mount options 13:46:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xab}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:37 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x3e, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xad}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 568.450880] IPVS: ftp: loaded support on port[0] = 21 13:46:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 568.479993] hfs: umask requires a value [ 568.506568] hfs: unable to parse mount options [ 568.529521] IPVS: ftp: loaded support on port[0] = 21 13:46:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0xa}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:38 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/257], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:38 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x1f00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r3}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffffffffff40b, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@type={'type', 0x3d, "f5dc4a69"}}, {@dir_umask={'dir_umask', 0x3d, 0x6}}, {@gid={'gid', 0x3d, r3}}, {@gid={'gid', 0x3d, r5}}, {@quiet='quiet'}]}) 13:46:38 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[], 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x121000, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x20000, 0x0) 13:46:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0xb}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 569.297465] IPVS: ftp: loaded support on port[0] = 21 13:46:38 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x2000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x38080, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000180)=r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000000100)={0xc15, 0x20, 0x1, 0x3, 0xfff, 0x5}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='umask=00000000000020000000001,[{r_umask=00000000\x0000000000000102,\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 13:46:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0xc}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:38 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x41, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:38 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x2001}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0xd}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 569.714642] hfs: umask requires a value [ 569.718654] hfs: unable to parse mount options [ 569.753717] IPVS: ftp: loaded support on port[0] = 21 13:46:38 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x5865}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/257], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0xa}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x34, r3, 0xc694d42685586125, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_LINK={0x8}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_MEMORY_LIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6_vti0\x00', r9, 0x4, 0x30, 0xb5, 0x18, 0x0, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000, 0x1, 0x0, 0x40}}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r3, 0x4, 0x70bd28, 0x25dfdbff, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_NET_NS_FD={0x8, 0x7, r5}, @GTPA_LINK={0x8, 0x1, r10}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4018000) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="716d61736b3d303030303030303030303030323030303030303030b0312c00"]) [ 570.182539] IPVS: ftp: loaded support on port[0] = 21 [ 570.325446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 570.469760] hfs: unable to parse mount options 13:46:39 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x6000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:39 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[], 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) 13:46:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0xb}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) capget(&(0x7f00000000c0)={0x3a2ad6152ea33728, r4}, &(0x7f0000000100)={0x8000, 0x401, 0xc4, 0x2, 0xff, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000080)=0x9, 0x4) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:39 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/259], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 570.931685] IPVS: ftp: loaded support on port[0] = 21 13:46:40 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x300, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0xc}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x6558}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 571.138982] IPVS: ftp: loaded support on port[0] = 21 [ 571.223252] hfs: umask requires a value 13:46:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0xd}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 571.251529] hfs: unable to parse mount options 13:46:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x8100}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 571.349354] hfs: umask requires a value [ 571.377119] hfs: unable to parse mount options 13:46:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0x14, 0xa9}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="756d617397c084316b3d4ecd96244c4f9ac1e530303030303030303030303032303030303030303030312c00"]) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x2000, 0xb000}) [ 571.658488] IPVS: ftp: loaded support on port[0] = 21 [ 571.682436] hfs: unable to parse mount options 13:46:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local={0xac, 0x14, 0x14, 0xab}, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xab01}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000040)=""/178, &(0x7f0000000100)=0xb2) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/259], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 572.056601] hfs: umask requires a value [ 572.086547] hfs: unable to parse mount options 13:46:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:41 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x4e4, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xffffffffffffffff, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xffffffffffffffff, r5, 0x0) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@umask={'umask', 0x3d, 0x4}}], [{@uid_gt={'uid>', r3}}, {@fowner_lt={'fowner<', r5}}]}) [ 572.289024] IPVS: ftp: loaded support on port[0] = 21 13:46:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d61736b3d30300330303030303030303032303030303030303030312c00"]) 13:46:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x34000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 572.621050] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.639207] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.671360] hfs: unable to parse mount options [ 572.680604] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.711551] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 13:46:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/259], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x400300}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 572.756939] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.811450] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.851454] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.879691] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.905653] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.932176] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.945703] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 572.992147] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.006645] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.021672] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.035078] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.044372] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.062067] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.092275] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.110116] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.124846] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.152517] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.183382] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 573.197799] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x546}, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/937], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x8001) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x10, 0x0}, 0x30) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_CREATE(r4, &(0x7f0000000240)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000001c0)=""/85, 0x55, 0x1, 0x3, 0x9, 0x0, 0x400}}, 0x120) socket(0x0, 0x80000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 13:46:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'ip6tnl0\x00', @remote}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000040)={{0x2}, 'port0\x00', 0x0, 0x20000, 0x6b, 0xfff7f144, 0x1, 0x81, 0x4b0, 0x0, 0x1, 0x6f}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d61736b3d3030303030300000200830000000000000000000005f150000"]) 13:46:42 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x34000, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x32, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:42 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf0ffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 573.491039] IPVS: ftp: loaded support on port[0] = 21 [ 573.544305] hfs: can't find a HFS filesystem on dev loop5 13:46:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x52, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/260], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:42 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x1000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303032303030303030303030312c7375626a5f7479f7653d2f2d242c61707072616973652c00"]) inotify_init1(0x0) 13:46:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x70, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 574.066642] hfs: umask requires a value 13:46:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x2000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 574.110554] hfs: unable to parse mount options 13:46:43 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x20000381, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) [ 574.366138] IPVS: ftp: loaded support on port[0] = 21 13:46:44 executing program 3: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) getsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:46:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) 13:46:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xaa, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x3000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:44 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/260], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:44 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x7ffffffe, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) [ 575.405517] hfs: umask requires a value 13:46:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xba, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 575.433355] hfs: unable to parse mount options 13:46:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) clock_gettime(0x0, &(0x7f00000003c0)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x141102, 0x0) [ 575.458874] IPVS: ftp: loaded support on port[0] = 21 13:46:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x4000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 575.551498] hfs: umask requires a value [ 575.563046] hfs: unable to parse mount options 13:46:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xcd, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 575.634084] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.667463] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 13:46:44 executing program 5: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000380)=0x9) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f00000000c0)=0x54) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f00000001c0)=0xd4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="fd1cac1d717f4103b9c2785ace27f780dd115ff702000000004000978d1abeca993df9bad780260cbdc0cf95c938be4a2828bdf42e98824ec3b1353c6df4b03f3ad1b3f6abea6c5d84be32267dbe52bbd7000000000000000000000000000000000000862e00", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom$phonet(r7, &(0x7f0000000100)=""/77, 0x4d, 0x40006040, &(0x7f0000000180)={0x23, 0x6, 0x0, 0x1f}, 0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={r5, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x20, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75303247b2db8c38243000"/27]) [ 575.709291] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.734907] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 13:46:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x5000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xec, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 575.786816] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.844340] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.880179] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.921732] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 575.952466] hfs: unable to parse mount options [ 575.964421] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 13:46:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x12c, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 575.990480] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 13:46:45 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x6000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 576.059301] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.097279] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 13:46:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x40, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000080)={0x4, {0x3, 0x9, 0x27, 0x2}}) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f00000001c0)={0x20, 0x2, {0x0, 0x1, 0x1ff, 0x1, 0x15}, 0x6}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d61736b2b30303030303030303030306e6da20f2bfade01bb09f5d232"]) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5c7) r6 = openat$cgroup_ro(r4, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000180)) 13:46:45 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/260], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 576.133094] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.173866] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.219074] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.263179] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.292664] hfs: unable to parse mount options [ 576.303166] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.316625] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.329830] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.337030] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.359914] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.371319] hfs: unable to parse mount options [ 576.380601] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 576.397930] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:45 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xfffffdef, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x14c, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:45 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x8000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) sendto$x25(0xffffffffffffffff, &(0x7f0000000040)="9a05f650838485ede59cbb382be26ed4cc29b5df89a7140fd7d706b6c3c6507dcd98e209e5f3dd737af7884d3e031fdf1787d03317cddd17e886e4f365aff1d0964d71d012e4ed77154b8a6e215f2d445e8193a81908918c78f24d1a04833aa9e436f48d322c0c4ac36117ad61c196418ace8b05177b4f0dc4242da8587cdd3969e8f7f9647f8b961609b67c14269b461ccbd0e70ebf3e0f0118e0546488c6", 0x9f, 0x2000008c, 0x0, 0x0) 13:46:45 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 576.676473] IPVS: ftp: loaded support on port[0] = 21 13:46:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x14e, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 576.809165] hfs: umask requires a value 13:46:45 executing program 3: [ 576.854730] hfs: unable to parse mount options 13:46:45 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x9000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 576.971120] hfs: umask requires a value [ 576.975315] hfs: unable to parse mount options 13:46:46 executing program 3: 13:46:46 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x150, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10044, &(0x7f00000001c0)=ANY=[@ANYBLOB="756d61736b3d30303030303032303030303030303030312c00d3fb30c396b150e729aed0969ef1cb3cfec69e32e5ee0775eaa8b0a58280b00b388895eda9434868dd2ae04b809b133dd3759f5e76a5df63cd479622a2608968c4d9be93486f99d6eca53fdb5a5d024e196ad878a2119085590ba8023e1a05c3eb149fdc72e03dbe0aeb44bd7392b5bbe8478358f2e11bf064fecd58f8a2"]) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="4f3c09853948faddc6e7f7a7fe277965", 0x10) [ 577.166044] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.177321] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.207076] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.230832] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.256704] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.281880] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.292007] hfs: umask requires a value [ 577.307100] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.309991] hfs: unable to parse mount options [ 577.333442] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.357959] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.381075] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.405799] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.445599] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.479741] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.515671] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.536600] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.556718] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.578424] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.596690] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 13:46:46 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffff1f, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:46 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xa000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x162, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:46 executing program 3: 13:46:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r3, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1e0, r3, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffeff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffdd2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}]}, @TIPC_NLA_BEARER={0xd8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7fff, @private2, 0xfffffffa}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x5}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010102}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @private0={0xfc, 0x0, [], 0x1}}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3fc0000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x21d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffc2d5}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7039}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x603e}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) [ 577.618657] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.633839] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.655801] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.670180] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 577.690367] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:46 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 577.734069] IPVS: ftp: loaded support on port[0] = 21 13:46:46 executing program 3: 13:46:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x16a, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 577.811635] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.813538] hfs: umask requires a value [ 577.818369] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.818388] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.818404] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.878488] hfs: unable to parse mount options 13:46:46 executing program 3: [ 577.918207] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.941378] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.956013] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 13:46:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = msgget(0x3, 0x604) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000040)=""/160) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x5387, &(0x7f0000000100)) [ 577.976534] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 577.993425] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.010736] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 13:46:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x182, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 578.031767] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.048843] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.066103] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 13:46:47 executing program 3: [ 578.081002] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.096688] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.114678] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.124473] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.135379] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.144844] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.154885] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.175882] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.183190] hfs: umask requires a value [ 578.201038] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 578.207359] hfs: unable to parse mount options [ 578.228120] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:47 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffff80, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:47 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xb000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1a4, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:47 executing program 3: [ 578.319278] IPVS: ftp: loaded support on port[0] = 21 13:46:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 578.371399] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.379314] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.417384] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.442241] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 13:46:47 executing program 3: [ 578.469949] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.485382] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.509907] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 13:46:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1be, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 578.529756] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.547029] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.564699] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.568302] hfs: umask requires a value [ 578.582285] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.600436] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.616372] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.626556] hfs: unable to parse mount options 13:46:47 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xc000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 578.634251] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.654215] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.668435] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 13:46:47 executing program 3: [ 578.682720] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.703400] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.710210] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.722511] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.729599] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.744090] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 578.761609] hfs: umask requires a value [ 578.765804] hfs: unable to parse mount options 13:46:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1c6, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 578.780430] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 578.883887] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.902154] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.922683] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.939847] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.957586] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.976020] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 578.994669] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.018949] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.042288] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.064971] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.088374] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.123156] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.145726] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.181595] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.204138] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 13:46:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffff82, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:48 executing program 3: 13:46:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756d61736b3d05103030303030303030303032303030303030303030312c00"]) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x14000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000a12f35303cab2da9e0ee642ac50045da12", @ANYRES16=r4, @ANYBLOB="010300000000000000000c00000008000300", @ANYRES32], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r4, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x71}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffffffc0}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008004}, 0x4000010) read$fb(r2, &(0x7f0000000080)=""/35, 0x23) 13:46:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xe000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1fe, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 579.225743] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.244990] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.259701] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.284058] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.303619] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.325934] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 13:46:48 executing program 3: [ 579.339000] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 579.358414] IPVS: ftp: loaded support on port[0] = 21 [ 579.369862] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x203, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:48 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 579.422565] hfs: unable to parse mount options 13:46:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:48 executing program 3: 13:46:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000040)={0x6, 0x0, @value=0x40}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb0, 0x1405, 0x400, 0x70bd26, 0x25dfdbff, "", [{{0x8}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x1}}, {{0x8}, {0x8}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8}}, {{0x8}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x2}}, {{0x8}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8, 0x3, 0x1}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x81}, 0x404) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 579.560067] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.580807] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 13:46:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x224, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 579.624009] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.648433] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.673994] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.697481] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.718443] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.738201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=9550 comm=syz-executor.5 [ 579.743110] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.774790] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.792112] hfs: umask requires a value [ 579.796937] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.799443] hfs: unable to parse mount options [ 579.820154] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.833018] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.853202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=9550 comm=syz-executor.5 [ 579.855405] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.874238] hfs: umask requires a value [ 579.875950] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.878433] hfs: unable to parse mount options [ 579.888062] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.926970] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.957530] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 579.981934] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 580.003895] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 580.027355] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 580.048790] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 580.072930] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 580.097378] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:49 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffffc0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:49 executing program 3: 13:46:49 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x10000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x228, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0xfffffffffffffffe, 0xffffffffffffffe9, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0]) 13:46:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:49 executing program 3: [ 580.304257] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.319767] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 13:46:49 executing program 3: [ 580.352970] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.379053] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.409665] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.443246] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 13:46:49 executing program 3: [ 580.467723] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.487464] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 13:46:49 executing program 3: [ 580.518985] IPVS: ftp: loaded support on port[0] = 21 [ 580.527749] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.556788] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 13:46:49 executing program 3: [ 580.585487] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.609906] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.633959] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 13:46:49 executing program 3: [ 580.656377] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.679180] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.695444] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.711160] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.718111] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.736582] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.755502] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.766985] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.784930] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 580.796122] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:50 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffffc2, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:50 executing program 3: 13:46:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x22a, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:46:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x88000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0xd336}}]}) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x2000}]) io_getevents(r3, 0x5, 0x0, &(0x7f0000000040), 0x0) 13:46:50 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x1f000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:50 executing program 3: [ 581.197921] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.208234] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.220437] hfs: can't find a HFS filesystem on dev loop5 [ 581.228667] IPVS: ftp: loaded support on port[0] = 21 13:46:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x22c, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 581.245356] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 13:46:50 executing program 3: [ 581.279009] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.302674] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.323302] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.343239] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.364280] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.383107] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.402196] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.420148] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.439624] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.454763] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.469205] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.482818] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.489569] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.503399] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.510155] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.523325] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.530079] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 13:46:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 581.544040] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.552774] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 581.565447] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:50 executing program 3: [ 581.622409] hfs: can't find a HFS filesystem on dev loop5 [ 581.646879] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.657206] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.672645] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.679393] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.692781] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.699864] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.713375] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.722143] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.729000] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.742824] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.749582] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.760108] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.771713] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.778483] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.790046] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.800154] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.813817] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.823050] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.829807] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.842993] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.849790] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 581.859916] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 13:46:50 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 581.872595] hid-generic 0000:0000:0000.0020: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 581.970143] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 581.995371] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.018255] IPVS: ftp: loaded support on port[0] = 21 [ 582.064193] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.104855] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.132106] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.164006] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.180985] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.206634] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.234237] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.256716] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.280071] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.304148] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.323674] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.341727] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.362480] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.381210] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.397531] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.406180] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.417202] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.426477] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.437283] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.445782] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 582.457547] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:53 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0xffffffe0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x24a, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x20000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@iocharset={'iocharset', 0x3d, 'maccyrillic'}}]}) socket$phonet_pipe(0x23, 0x5, 0x2) 13:46:53 executing program 3: 13:46:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 584.608782] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.619976] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.646229] IPVS: ftp: loaded support on port[0] = 21 [ 584.651793] hfs: can't find a HFS filesystem on dev loop5 13:46:53 executing program 3: 13:46:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x262, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 584.652199] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 13:46:53 executing program 3: 13:46:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x20010000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 584.718875] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.763571] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.799454] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.835083] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.856446] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.875528] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.894042] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.919986] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.920004] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.974883] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 584.992153] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.009223] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.056329] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.084721] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.111389] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.137765] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.164702] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.191182] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 13:46:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, 0x0, 0x0) [ 585.216982] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 585.246789] hid-generic 0000:0000:0000.0022: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:54 executing program 3: [ 585.379021] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.399145] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.430441] hfs: can't find a HFS filesystem on dev loop5 [ 585.436740] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.468641] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 13:46:54 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x26e, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:54 executing program 3: 13:46:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x60000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0xd, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="756de1736b3d30303030303030303030303032303030303030303030312c00"]) [ 585.507466] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.554591] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.584758] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.599036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=9864 comm=syz-executor.5 [ 585.615642] IPVS: ftp: loaded support on port[0] = 21 [ 585.621091] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 13:46:54 executing program 3: 13:46:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x272, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 585.645913] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.680572] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.689348] hfs: unable to parse mount options 13:46:54 executing program 3: [ 585.715297] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 13:46:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x65580000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x292, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 585.755495] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.776241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=9864 comm=syz-executor.5 [ 585.787766] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.798630] hfs: unable to parse mount options [ 585.829285] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.857822] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.882358] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.914215] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.949421] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 585.977711] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 586.001673] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 586.026022] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 586.051387] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 586.076656] hid-generic 0000:0000:0000.0023: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, 0x0, 0x0) 13:46:55 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) sendmsg$sock(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) mount$overlay(0x40000a, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) [ 586.187077] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.221707] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.263921] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.297263] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.327856] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.359104] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.388118] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.416291] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.443637] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.469166] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.497128] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.523685] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.552785] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.582910] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 13:46:55 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x3, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRESOCT, @ANYBLOB="c18f050000000000000005"], 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r5, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x4004011) 13:46:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x29f, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x81000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key(&(0x7f0000000100)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4004ae52, &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 586.608490] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.634961] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.674864] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.707363] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 13:46:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2d6, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 586.733128] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.748650] hfs: umask requires a value [ 586.752979] IPVS: ftp: loaded support on port[0] = 21 [ 586.766491] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.777793] hfs: unable to parse mount options 13:46:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x88a8ffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 586.805913] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000040 data 0x6 [ 586.808976] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.868903] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000004 data 0xe7 [ 586.894313] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 [ 586.896497] hfs: umask requires a value [ 586.905666] hfs: unable to parse mount options [ 586.935759] hid-generic 0000:0000:0000.0024: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 586.947240] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000007f data 0x5 13:46:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2ea, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 586.997376] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000002f data 0x7e 13:46:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, 0x0, 0x0) [ 587.055542] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000050 data 0x2e 13:46:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x300, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x9effffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 587.106393] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000008c data 0x51 [ 587.127014] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.146265] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.156028] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000008e data 0x92 [ 587.192328] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 13:46:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x302, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 587.206707] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000008c data 0x8f [ 587.230542] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.250199] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000017 data 0xe2 [ 587.269410] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.287697] kvm [9948]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000078 data 0x16 [ 587.302235] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.335804] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.368217] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.397600] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.426811] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.445434] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.462835] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.482791] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.500364] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.517075] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.559625] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.586954] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.612252] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.635606] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.662399] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.688164] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.715442] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 [ 587.743635] hid-generic 0000:0000:0000.0025: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:56 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x6, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget$private(0x0, 0x207, 0x0) semtimedop(r1, &(0x7f0000000240)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = semget$private(0x0, 0x207, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f00000000c0)) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x7fff, 0x1800}], 0x1, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) r5 = semget$private(0x0, 0x207, 0x0) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semctl$IPC_RMID(r5, 0x0, 0x0) semctl$SETVAL(r5, 0x0, 0x10, &(0x7f0000000080)=0x3d) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xab010000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x318, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$sock(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)="9d", 0x1}], 0x1, &(0x7f0000000040)=[@timestamping={{0x14}}], 0x18}, 0x0) 13:46:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:46:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x360, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 587.993856] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.005259] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.022571] hfs: umask requires a value [ 588.042776] IPVS: ftp: loaded support on port[0] = 21 [ 588.046578] hfs: unable to parse mount options [ 588.049907] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 13:46:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf0ffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 588.097425] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 13:46:57 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x0, 0x14, 0xa, 0x0, 0x0, 0x7, 0xb, 0x2, 0xb, 0x3, 0x0, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) fstat(r5, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRESDEC, @ANYRES32=r2, @ANYBLOB, @ANYRES32=r6, @ANYRES32, @ANYBLOB, @ANYRES64, @ANYBLOB="86d8f193b2f4a1ef115db61b34f46d71029bf521a28e262e7cdbf96058213d64e1237b9373fbdd30a1be3029e8c7cb7f7993b6498b3a005f2d3788d13888515e9da4750a80cc338bb799a578f5241f22a0ecbf710e1b63263d245ceb3f51d8eda05650318eacf0815cb9f81d2fa4c2c53c126a6571d1ef0fddd071eaa6273bc6fed3f9086a6402bef7001ad699446d87d593f93e71585864ed3a0c29d71ef160947c12fe4748bf5cba496f479b091f50a75b5a12080e08f357e79c18d5210f302600bbe7a7dde51955976c8413f4b168c5fd024147df67350e34"], 0x70}}, 0x20000001) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'ip6_vti0\x00', r6, 0x2f, 0x5, 0xfc, 0x7, 0x4, @remote, @mcast2, 0x80, 0x0, 0x5, 0x7}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x400c084) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x370, 0xb8, 0xb8, 0xb8, 0xb8, 0xb8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz1\x00'}}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'geneve0\x00', 'ip6_vti0\x00'}, 0x0, 0x1c0, 0x220, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x56, 0x3}}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 588.143005] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 13:46:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x376, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x833f, 0x10000) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 588.193636] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 13:46:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x20090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x441, &(0x7f00000002c0)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$chown(0x4, r1, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x92}, 0x4e20, 0x5, 0x4e24, 0xffff, 0xa, 0x0, 0x20, 0x2b}, {0x100, 0x405, 0x3, 0x9bfb, 0x6, 0x8, 0x1, 0x4}, {0x4, 0x3f, 0x3, 0x1}, 0x1ed, 0x6e6bb9, 0x2, 0x1, 0x1, 0x1}, {{@in=@multicast1, 0x4d3, 0x32}, 0xa, @in=@private=0xa010102, 0x3503, 0x0, 0x1, 0x4, 0x6, 0x5, 0x5}}, 0xe8) io_setup(0x0, &(0x7f0000000200)) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x1, 0x0) ioctl$LOOP_SET_STATUS(r2, 0xc03012f3, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "e1ed5a0e928fb32e82be254cf2048bcbdf8ae941c0eedb11651da62e287215b04689814b807a4ff8c7444ca1ee1efe6a562e0fbc034d363cd3834f82657caf19", "ba760d8bfdd24ac263bdb5740b83f4586ad91cc8b72c5ef100"}) [ 588.239051] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.272389] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.315110] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.348496] hfs: umask requires a value [ 588.356112] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.356688] hfs: unable to parse mount options [ 588.387676] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.417557] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.448146] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.449989] hfs: umask requires a value [ 588.484293] hfs: unable to parse mount options [ 588.486817] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.525411] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.558525] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.588713] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.615836] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.645399] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.668514] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.696199] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.720879] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 588.754835] hid-generic 0000:0000:0000.0026: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:58 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xa, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x380, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xfcffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:46:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x35}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c}, 0x64) 13:46:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x62e000) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000080)=""/44) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040), 0x0) [ 589.106413] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.119156] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.145049] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.155885] hfs: umask requires a value [ 589.161433] IPVS: ftp: loaded support on port[0] = 21 [ 589.171172] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.189321] hfs: unable to parse mount options 13:46:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x398, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 589.202022] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 13:46:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000340), 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$cgroup_int(r1, &(0x7f0000000380), 0xffffff8d) [ 589.232509] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 13:46:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xffffa888}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 589.274679] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.306624] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.333874] hfs: umask requires a value 13:46:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3e8, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 589.354443] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.356768] hfs: unable to parse mount options [ 589.394209] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.421909] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.446951] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 13:46:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xfffff000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 589.472953] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 13:46:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3f0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 589.513613] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.545509] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.574846] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.598898] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.623938] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.647905] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.667555] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.698636] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.715938] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 [ 589.735857] hid-generic 0000:0000:0000.0027: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:58 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xf, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x44, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev}]}, 0x44}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:46:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xffffff7f}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3f3, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040), 0x0) [ 590.020782] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.027497] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 13:46:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3fc, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 590.069724] IPVS: ftp: loaded support on port[0] = 21 [ 590.076147] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.081861] hfs: umask requires a value [ 590.112835] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.115239] hfs: unable to parse mount options 13:46:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xffffff9e}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 590.153799] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.190934] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.223668] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.247434] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 13:46:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffe1, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0x20}, 0x20) 13:46:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1803, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000004440)='keyring\x00', &(0x7f0000004480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x1d, r2, &(0x7f00000000c0)=""/16, 0x4) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r2, 0x2e, 0xfb}, 0x0, &(0x7f00000001c0)="1b10fc6648e06330aacb9547d99007be46f1e2eca7a983d97d437e3059333ef06133cca52660f20289482107a426", &(0x7f00000000c0)=""/251) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 590.296241] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.333127] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.360040] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.387991] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 13:46:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xfffffff0}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 590.413450] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.440878] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.447968] hfs: umask requires a value 13:46:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 590.470725] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.478247] hfs: unable to parse mount options [ 590.488765] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.505342] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.519685] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.535698] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.558103] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.572152] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.584999] hfs: umask requires a value [ 590.585116] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 590.600229] hfs: unable to parse mount options [ 590.613009] hid-generic 0000:0000:0000.0028: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:46:59 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x11, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:46:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2402, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:46:59 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040), 0x0) 13:46:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffe1, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0x20}, 0x20) 13:46:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xfffffffc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:46:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0xa10000, 0xe4d, 0x1000, r2, 0x0, &(0x7f0000000080)={0x9b090d, 0x836, [], @p_u16=&(0x7f0000000040)}}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000041000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_MEMORY_LIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000240)={'ip_vti0\x00', r9, 0x7800, 0x7, 0x0, 0x7, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0xd4, 0x2f, 0x0, @local, @loopback, {[@cipso={0x86, 0x10, 0x3, [{0x0, 0xa, "ed9f64dc84493738"}]}, @ra={0x94, 0x4, 0x1}]}}}}}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303032303030303030303f30312c003e69262e948d8c7b9a5d377b8d8b9e6101a3ee28fadffd53cdd0354ae2cb821359edcdfbf9fcc6af3d5551cfad4a71efaf59e35441072989d4e38b83891e6416130f5fea4b417eff74bebc415c1de50b55000cf9f3c788da43cbea7f335d0305c88cf4da0057f36388d83e142b214848d92647d7d927d31e77a8fd"]) [ 590.834617] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 590.846979] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 590.872154] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 590.887785] IPVS: ftp: loaded support on port[0] = 21 [ 590.899003] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 590.907649] hfs: unable to parse mount options 13:46:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2802, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 590.935690] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 590.973299] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 13:47:00 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xffffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 591.009112] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.039833] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 13:47:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @broadcast}, {0xc2cf037d1a0003ed, @remote}, 0x28, {0x2, 0x4e22, @remote}, 'gretap0\x00'}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 591.070150] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.108614] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 13:47:00 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c00000010001fff000026711c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f8b2992e70000140012800a00010076786c616e0000000400028008000a003645bcdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 591.138592] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.163058] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 13:47:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2a02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 591.186256] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.208352] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.231809] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.236231] hfs: umask requires a value [ 591.254593] device vxlan0 entered promiscuous mode [ 591.268770] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.277512] hfs: unable to parse mount options [ 591.287055] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.301288] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.308147] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.325075] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 13:47:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) [ 591.334717] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.341934] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 591.354726] hid-generic 0000:0000:0000.0029: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 591.402990] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.410438] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.458442] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.485081] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.507626] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.531273] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.551200] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.571713] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.591974] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.610024] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.628812] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.647486] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.667907] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.687028] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.703949] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.724681] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.746130] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.765229] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.783246] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.793549] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.804902] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.814002] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 591.826735] hid-generic 0000:0000:0000.002A: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:00 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x12c, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:00 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 13:47:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2c01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:00 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000000c0)={r3, r0, 0x1f, 0x3a, &(0x7f0000000080)="3bf581dfc1c575d96aa655d73ff99aad3dc4b24eda5c811e6967eb8c94a70b0f5beda249b2681dba578955bc09beaaa36df55af4ed06ef07a093", 0x56, 0x20, 0x8, 0x3, 0x3, 0x0, 0x100000, 'syz0\x00'}) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 591.912534] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 591.919573] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 591.938726] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 591.954166] IPVS: ftp: loaded support on port[0] = 21 [ 591.959870] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 591.982330] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.009118] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2c02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 592.041465] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.071679] hfs: umask requires a value [ 592.075677] hfs: unable to parse mount options [ 592.079476] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3200, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 592.115183] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.147004] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.174081] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.200217] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x80, 0x0) fcntl$setpipe(r2, 0x408, 0x0) r3 = dup2(r1, r2) write$FUSE_POLL(r3, &(0x7f0000000180)={0x18}, 0x18) 13:47:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 592.223838] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.253260] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x2}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 592.277274] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.301604] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3f00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 592.324208] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.346671] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.368559] hfs: umask requires a value [ 592.368568] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.368586] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.389896] hfs: unable to parse mount options [ 592.417035] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 13:47:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) [ 592.427719] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 592.444103] hid-generic 0000:0000:0000.002B: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 592.574353] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.584523] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.614053] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.637150] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.654717] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.675803] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.701336] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.724025] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.746838] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.765068] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.784879] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.805588] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.823165] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.835736] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.845736] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.856022] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.865236] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.875711] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.884992] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.896334] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.905571] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.915664] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 592.926672] hid-generic 0000:0000:0000.002C: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:02 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x300, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffe1, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0x20}, 0x20) 13:47:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303032303030303030303030312c00929281c44b1f5c848db698dcc38006e05f3b0eb77fdb7f2220d06e0d79dd3f3de9d7de730712f28c047d6360b5940484f701062d3bdca4397c84b9afedf426c6964d1a4463f2df8813b3a4274e20dbe6ef6acba82e433ae94fb26bde883e2d5e3560f4ad70f0f34668c9a7a8a1ced13290ad07"]) 13:47:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x3}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/254, 0xfe}, 0xffffff9e}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) syz_genetlink_get_family_id$ipvs(0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000100) 13:47:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(0xffffffffffffffff) [ 593.198041] IPVS: ftp: loaded support on port[0] = 21 13:47:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4a02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 593.412892] hfs: umask requires a value [ 593.416901] hfs: unable to parse mount options 13:47:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24000000070601010000000000000000000000000500010006"], 0x24}}, 0x0) 13:47:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) getsockopt$bt_hci(r0, 0x29, 0x18, 0x0, &(0x7f0000000200)) 13:47:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x4}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x20, r3, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8cd}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x1450f18a6846dc95) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/36, 0x24) [ 593.530049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 593.547779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 593.675930] hfs: umask requires a value [ 593.712401] hfs: unable to parse mount options 13:47:02 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x5dc, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl(r0, 0x8b37, 0x0) 13:47:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4c01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x4003fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r3, 0x540a, 0x2) dup3(r3, r2, 0x0) 13:47:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x5}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:02 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$CHAR_RAW_FRASET(r0, 0x1264, &(0x7f0000000080)=0x3ca1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f00000000c0)) 13:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="74ed278877c5", @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 13:47:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4e01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 594.037480] hfs: umask requires a value [ 594.042175] IPVS: ftp: loaded support on port[0] = 21 [ 594.047323] hfs: unable to parse mount options 13:47:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x6}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x4003fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCXONC(r3, 0x540a, 0x2) dup3(r3, r2, 0x0) [ 594.155289] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:47:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x5001, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 594.231274] hfs: umask requires a value [ 594.239295] hfs: unable to parse mount options [ 594.263369] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:47:03 executing program 4: 13:47:04 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x600, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x8}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:04 executing program 4: 13:47:04 executing program 3: 13:47:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x5200, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="e8", 0x1}], 0x1) 13:47:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@updpolicy={0xb4, 0x15, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb4}}, 0x0) [ 595.281023] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 595.336419] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. 13:47:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000020000b85d, 0x187f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='nfs\x00', 0x0, &(0x7f0000000000)) 13:47:04 executing program 4: perf_event_open(&(0x7f0000001180)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/24, 0x18}, {0x0}], 0x2, 0x0, 0x0) 13:47:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6003, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 595.467095] hfs: umask requires a value [ 595.476397] hfs: unable to parse mount options [ 595.491221] IPVS: ftp: loaded support on port[0] = 21 13:47:04 executing program 4: 13:47:05 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xa00, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:05 executing program 4: 13:47:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6201, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RXATTRWALK(r3, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x6}, 0xf) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=ANY=[@ANYBLOB="4040000024001d0f0000000000000000000000007351117969c4ea0421cee199f747776d86f387a57ca7a8484b44fbbc5b87dafcd510cb78443b643b1eb94fdcc87909", @ANYRES32=r7, @ANYBLOB="00000000f1ffffff000000000d00010066715f636f64656c000000000c0002000800090000000000"], 0x40}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="c222560e1378"}]}, 0x64}, 0x1, 0x0, 0x0, 0x4080}, 0x20000844) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_RX(r9, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "e1ff2e9c2851cc0f", "6ea66bb1cdfc2d0b251fde8e80f2c398", "a015839f", "5a641c6c78a1d453"}, 0x28) 13:47:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x9}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:05 executing program 3: 13:47:05 executing program 4: 13:47:05 executing program 3: [ 596.413432] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:47:05 executing program 4: 13:47:05 executing program 3: 13:47:05 executing program 4: 13:47:05 executing program 3: [ 596.651829] hfs: umask requires a value [ 596.655834] hfs: unable to parse mount options [ 596.666886] IPVS: ftp: loaded support on port[0] = 21 [ 596.728258] hfs: umask requires a value [ 596.739510] hfs: unable to parse mount options 13:47:06 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xf00, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:06 executing program 4: 13:47:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6202, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:06 executing program 3: 13:47:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xa}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) sendfile(r0, r2, &(0x7f0000000140)=0x80, 0xe00) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_MEMORY_LIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl2\x00', r7, 0x29, 0x8, 0x5a, 0x101, 0x1, @private0, @loopback, 0x80, 0x8, 0x511, 0x40}}) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:06 executing program 4: 13:47:06 executing program 4: 13:47:06 executing program 3: 13:47:06 executing program 4: [ 597.355282] IPVS: ftp: loaded support on port[0] = 21 [ 597.361665] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:47:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6a01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 597.551863] hfs: umask requires a value [ 597.567874] hfs: unable to parse mount options [ 597.645491] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:47:06 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x1100, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:06 executing program 4: 13:47:06 executing program 3: 13:47:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6e02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket(0x400000000000010, 0x802, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000014000500"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000024001d0fd0000000fbdbdf2500000000", @ANYRES32=r8, @ANYBLOB="0000f2ffe0ffffff000000000a000100706669666f0000000800020028000000"], 0x38}}, 0x40001) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c010000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fcdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="7c00028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004008a00000008000600d29ee60d9dd3d8b6704fa738713bee213671bf10f1c752e9b77f9d8643a7b19be5c2399ede4390fb31330206cd197e8ca8d7a0647efc0d091be794407c32a0c2c9e8cf1e6f66d819c97e1ce795832c9c67385ffd15fa424c6f2ee2330ec89b7a618f1ad13134d32a984e77e4c230cadc96f503a300a5ab0eaadfe47fe3f9b598e657b196f8642363515d467c299897572f", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="7c00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r8, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000005000300030000000800040001000000"], 0x11c}, 0x1, 0x0, 0x0, 0x1}, 0x24004001) write(0xffffffffffffffff, &(0x7f00000000c0)="240000ed190e020008160000100000ba108008000200", 0x16) getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)) 13:47:07 executing program 4: [ 598.037773] IPVS: ftp: loaded support on port[0] = 21 13:47:07 executing program 3: 13:47:07 executing program 4: 13:47:07 executing program 4: 13:47:07 executing program 3: 13:47:07 executing program 4: [ 598.251210] hfs: can't find a HFS filesystem on dev loop5 13:47:07 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x2c01, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:07 executing program 4: 13:47:07 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:07 executing program 3: 13:47:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x7000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x2000, 0x0) r2 = dup(r1) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@broadcast, @private=0xa010102, 0x1, 0x1, [@broadcast]}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:07 executing program 4: [ 598.854785] IPVS: ftp: loaded support on port[0] = 21 13:47:07 executing program 3: [ 598.877066] hfs: umask requires a value 13:47:07 executing program 4: [ 598.907595] hfs: unable to parse mount options 13:47:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x7202, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:08 executing program 4: 13:47:08 executing program 3: 13:47:08 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x3f00, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000480)={0x113, 0xc, &(0x7f0000000080)="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"}) 13:47:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:08 executing program 4: 13:47:08 executing program 3: 13:47:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x7603, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:08 executing program 4: 13:47:08 executing program 3: 13:47:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x8003, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:08 executing program 4: [ 599.779650] IPVS: ftp: loaded support on port[0] = 21 [ 599.786598] hfs: umask requires a value [ 599.818686] hfs: unable to parse mount options 13:47:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:08 executing program 3: 13:47:09 executing program 4: 13:47:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x10000}}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0xa, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @lookup={{0xb, 0x1, 'lookup\x00'}, @void}}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 13:47:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x8201, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:09 executing program 3: 13:47:09 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xdc05, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:09 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:09 executing program 4: 13:47:09 executing program 3: 13:47:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x9202, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 600.544371] IPVS: ftp: loaded support on port[0] = 21 [ 600.551591] hfs: can't find a HFS filesystem on dev loop5 13:47:09 executing program 4: 13:47:09 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf0}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:09 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x0, 0xe, 0x2000010e, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) 13:47:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x88180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f00000002c0)={0x32, @multicast1, 0x4e24, 0x0, 'sh\x00', 0x0, 0xf2, 0x54}, 0x2c) 13:47:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="dc"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4}}]}, 0x34}}, 0x0) 13:47:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x9803, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@getqdisc={0x28, 0x26, 0x8f887beb5772a5b7, 0x0, 0x0, {}, [{0x4}]}, 0x28}}, 0x0) [ 600.871820] hfs: umask requires a value [ 600.911918] hfs: unable to parse mount options [ 600.941762] IPVS: set_ctl: invalid protocol: 50 224.0.0.1:20004 [ 600.992892] hfs: umask requires a value [ 601.000305] hfs: unable to parse mount options 13:47:10 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x1000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) poll(&(0x7f0000000080)=[{r0, 0x0, 0x3}], 0x1, 0x201) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[], 0x0) 13:47:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x9f02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:10 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x120}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x14) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newtfilter={0x64, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x34, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x1}}, @TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x0, 0xfff2}}]}}]}, 0x64}}, 0x0) 13:47:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)) [ 601.383116] IPVS: ftp: loaded support on port[0] = 21 13:47:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xa401, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:10 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88c0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 601.423605] hfs: can't find a HFS filesystem on dev loop5 13:47:10 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x1ab}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xaa00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) [ 601.753193] hfs: umask requires a value [ 601.792055] hfs: unable to parse mount options [ 601.880062] hfs: umask requires a value [ 601.886316] hfs: unable to parse mount options 13:47:11 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x2000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xba00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:11 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@sndinfo={0x1c}], 0x1c}, 0x0) 13:47:11 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x300}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000080)='nr', 0x1) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$ppp(r5, &(0x7f00000000c0)="6f951a05af3f91206a7b138eeafbe5c5f59ae82bffc127a5c402820b3a9ae60fee6aef1cfdbefa10c7ec0bad0d78c2b4de242cab15f19eacacecb8f7a2d6ee3cbfd15b692023b34f432de8dbfe68854bc95c9fd0bece1b89fc86ead9c5529e", 0x5f) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffffffffffffff7b) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x5, 0x0, 0x0, 0x4010, &(0x7f0000000940)=ANY=[]) 13:47:11 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$unix(r1, &(0x7f0000000000)=@abs={0x8}, 0x8) [ 602.201932] IPVS: ftp: loaded support on port[0] = 21 [ 602.230689] hfs: can't find a HFS filesystem on dev loop5 13:47:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000180)=@in={0x32, 0x2}, 0x10, &(0x7f0000001380)=[{&(0x7f00000001c0)="be", 0x1}], 0x1, &(0x7f00000013c0)=[@dstaddrv6={0x1c, 0x84, 0xa, @empty}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}], 0x2c}, 0x0) 13:47:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xbe01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:11 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x500}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:11 executing program 5: io_setup(0x5, &(0x7f0000000180)=0x0) io_getevents(r0, 0xffffffff, 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 13:47:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 13:47:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x888d, 0x0) lseek(r0, 0x0, 0x2) [ 602.510170] hfs: unable to parse mount options 13:47:11 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x3000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xc601, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x1) 13:47:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f00000000c0), 0x8) 13:47:11 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x600}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000040)={0x8, 'veth1_virt_wifi\x00', {'veth0_to_hsr\x00'}, 0x400}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000001380)=[{&(0x7f00000001c0)="be", 0x1}], 0x1, &(0x7f00000013c0)=[@prinfo={0x14}], 0x14}, 0x0) 13:47:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000100)={0x2, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="b9", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1601"], 0xe0}, 0x0) [ 603.065789] IPVS: ftp: loaded support on port[0] = 21 13:47:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xcd00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:12 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 13:47:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="1c1c"], &(0x7f0000000000)=0x98) [ 603.148779] hfs: umask requires a value [ 603.165175] hfs: unable to parse mount options 13:47:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xd602, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:12 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x6000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:12 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x900}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="3d5a1b87db824b007d000000"]) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000040)=@rose={'rose', 0x0}, 0x10) 13:47:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x0, 0x2600}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffe}) 13:47:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x83, &(0x7f0000002180)=""/4097, &(0x7f0000001100)=0x1001) 13:47:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xe803, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xea02, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 604.012191] hfs: unable to parse mount options 13:47:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xec00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 604.062810] IPVS: ftp: loaded support on port[0] = 21 13:47:13 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xa00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:13 executing program 4: socket(0x1, 0x1, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 13:47:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x400, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x70bd27, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0xffe0}, {0x3}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffff8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180)={0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, [], 0x2}, 0x394}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000001c0)="19dd5110d8de8f971bfc579658b19f05c61493b395e7f67d303a1ffb0fbda0fc2abc4523c8734e7aac1a0e97568d4adc489f0b80751e7d58aeb790aa9f0997658c2ca70c51df17ce714155aa3063bd844a5439e32d696ebe117a84a01d0a60e44dbca58a7c1b816b6af2f55c706d30c9247e49b3e0cd88241a5c5042def90e664841307f10e866accc3b176eaafd94984bf4f16c2a6de5c9b877379107eee65c5e3ee24907db92c5256e06424ca1285caa7c4653dbbc953bf0b3db6e30d4bfdf8b9b8d63db47791fdf358232efa531242cc410f07d548933e56fe35b47c1960f67bd560b82c5", 0xe6}, {&(0x7f00000002c0)="e85f43fa93e5a8d8298af31f27a0aa00dcfb7e511154a7c3e503c18fd84827c8d161c96ffba84ac9b55331995826e262368fe71a02cf978f1a3fb2e1bb7b1fb9b9b99af1e0f6eda78834deb0beabd24ad0e02b30cad7039fa47a489fca321a32616fcd851fc0868334c7bda2bcfdf2b3eb68575bb4ca512db329f9ed32", 0x7d}, {&(0x7f0000000340)="246a331679b4180520c8a6769c19f356e7f27654f7b5d966a2dc561db898b63a7612c6122497eb5c4a68cb325fb90507abe8fe7aa3308fe6c650a072b2fad4038fba0ec7ad6f539597bb7ac2baeda3925b1a000483b70cd3f3ce32f9ea90e36c570e8222246b3371322ebf4f8de6459ed1d4f3bb2dab18e22855ea792debd88ca43bf7bcd809b38dd97bf197f3d821b749b98bcb4a5612e422f03d205486dd2c554b6329095cd1b91dd131ce67cdd43ba5bb287acfa56896165c54e25ef938c45d5965f7752b1f94ff12914764e46f89e1c1c78b5201e1b149e5bf2884e65673ef08", 0xe2}], 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="14000000000000030000000008000000030000000000000070000000000000002900000036000000290b0000000000000502000001020000074800000001101f05000800000000000000ffffff7f000000000900000000000000ad0d000000000000a10000000000000007000000000000000500000000000000020000000000000001010000010020000000000000002900000037000000270000000000000000010000000000001400000000000000290000004300000003000020000000002400000000000000290000003200000000000020000000000000000000000001109d2c5f6c9a0044c6af6f5693f01348fef01a5f458ac98e5bb6e2958a0f504b4a57751e76fbdf11ddbaa49af72108dc9895b84795215a178cc048315c5cd524005c33fa1a4531773535ff5b2040645bd2b73b074293da2011b235ac69b567f859239785f731e574a54fa7350158b03dc974da9a8a85f2fa5a58373c80cae45e3536feb520c3fd22e4c5446c596a43344a71d0c9bc31acb83ac16a60a1d3f91fd4e05bee38f3febdea", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x2d0}, 0x800) r4 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x800000000000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fanotify_mark(r4, 0xa0, 0x1, r8, &(0x7f0000000040)='./file0\x00') r9 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="756d61736b3d30303030303030303008070032020000003030303030312c008f5b961fcd23a5dcc7f114a0c696921d6deb663290ba9df5afd21e317bcfebdd7ca7fb9e50030a041a7ade248853caf5effef7bf50357f969d14364458911d52211bd44db2dccbd685efba4f50408d80dbcef916b53a1c74631586f9841609e56b3fdc1450004896ed5d9f4c6937fc6f1afcfd957e8dd3a2b849e5994d3513e3be88fefb107d9bdfb360799d2436689bc0b8362bb32cfe75d0a7fef26a8d15c5a9ae6a52e747ba4d619f2a72856f92ce664e080e243e9183987df4c6bee9338d7979725307e4e94a69e3b0c45a827442fb7a342553e58e8e69"]) 13:47:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xf003, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 604.360884] hfs: unable to parse mount options 13:47:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xf303, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:14 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xb00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="756d303030303032303030303030307030312c000000000800000000000000ee9eac"]) 13:47:14 executing program 4: socket(0x1, 0x1, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 13:47:14 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xa000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xfc03, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 605.127216] SELinux: duplicate or incompatible mount options [ 605.140970] hfs: unable to parse mount options [ 605.147101] IPVS: ftp: loaded support on port[0] = 21 13:47:14 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xc00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) 13:47:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xfe01, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8108, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x289a}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(r2, 0x200002) sendfile(r0, r2, 0x0, 0x80001d00c0d0) syz_genetlink_get_family_id$ipvs(0x0) [ 605.436562] SELinux: duplicate or incompatible mount options [ 605.450841] hfs: umask requires a value [ 605.484378] hfs: unable to parse mount options 13:47:14 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xe00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xff00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="009e536c274a6aa9546dd810b9c0355afb62a45ba27ee18a0676bae355f5863335b7601159291ed68aac8b5f099824ac9593b79baaee0d3f87e81e678e31b4e53315957e2cc1fd9fd7f502b522331d54530d53ba6c7e430e408aba10426edbd4a8951f100c2d046e10934a1e133ec3d779d376284788a7ba6fed5b86085da48575492121060ae5df820a98dcd764691e72ee296c95cbe63e24fcd6bc12220e496f2e08321b1ede5ae709ce2265a778b91be0bb5fede1c893b2c01a4f8cf424c284bd80ac"]) [ 605.702468] SELinux: duplicate or incompatible mount options [ 605.799848] hfs: can't find a HFS filesystem on dev loop5 13:47:15 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xf000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x40000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() 13:47:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:15 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getown(r0, 0x9) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) [ 606.187052] IPVS: ftp: loaded support on port[0] = 21 13:47:15 executing program 4: [ 606.214777] SELinux: duplicate or incompatible mount options [ 606.226332] hfs: umask requires a value 13:47:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x100000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 606.282369] hfs: unable to parse mount options 13:47:15 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x1f00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:15 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:15 executing program 4: [ 606.419743] hfs: umask requires a value [ 606.423750] hfs: unable to parse mount options 13:47:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1fffff, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:16 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x11000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000001}}]}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') 13:47:16 executing program 4: 13:47:16 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x2000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:16 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x1000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:16 executing program 4: [ 607.113397] IPVS: ftp: loaded support on port[0] = 21 13:47:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:16 executing program 4: [ 607.168263] hfs: umask requires a value [ 607.172272] hfs: unable to parse mount options 13:47:16 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:16 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x2001}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:16 executing program 4: 13:47:16 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x2c010000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x1080000002}}]}) 13:47:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:16 executing program 4: 13:47:16 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x5865}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:16 executing program 4: [ 607.852292] IPVS: ftp: loaded support on port[0] = 21 13:47:16 executing program 4: 13:47:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 607.963071] hfs: umask requires a value [ 607.993529] hfs: unable to parse mount options 13:47:17 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x6000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:17 executing program 4: 13:47:17 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x3f000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x18030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x4}, &(0x7f0000000100)=0x28) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@umask={'umask', 0x3d, 0x80000000}}]}) write$fb(r1, &(0x7f0000000040)="b3c84da7367b60561a07eab0708dc6f021fd64eb19635594009ab5902a9700221c66ad457b07b303c5c467b49b54d89223bae92ac59952cd315a2b91ff172c0e5c9564f31bba54784c96defac52df6b4df1dfb3a2eeab8bb46f900882815d806b060f986ca8d9345c47db9f6d2f168f8", 0x70) 13:47:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:17 executing program 4: 13:47:17 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x6558}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:17 executing program 4: 13:47:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x20000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:47:17 executing program 4: [ 608.815148] IPVS: ftp: loaded support on port[0] = 21 [ 608.826737] hfs: umask requires a value [ 608.839365] hfs: unable to parse mount options 13:47:17 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x8100}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 608.916612] hfs: umask requires a value [ 608.927538] hfs: unable to parse mount options 13:47:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f00000001c0)={0x0, 0xd, [], [@generic={0x0, 0x66, "a50054afd909401eb0b0105981990dfd64b5f9cc0aa658eb358caa3e685e3071d83dd672100d540e1061819e30e1db962d165deea75bffa3c699ac9b6e43a1cff5e27d638cd06522d2f62c0122960da339322bf47c24b8f63bc668ce0b34f28410260204e315"}]}, 0x70) shutdown(r1, 0x1) 13:47:18 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xdc050000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303032303030303030303030312c00e5b06065bd1a44ccd7bbae0f4040aebb0bb0623ca99e996c0ffde9af974ad870089639ca98be0e5733a7eabe36dd937e7b795e2adb89ee70f39e66324f707a75f730e96ed24e82d205b93367ff91e0eb2ff01c9ccba4df1389ae4cec44c86eca33738e16a2e5a4f5a1ba7bfe884fcac334fb0026f5f49076fcf564fcd029e14f2a6a42bc0f45948be0a7d7ac"]) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x27) tkill(r2, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0xd, &(0x7f0000000040)={0x3e, 0x121e, 0x2}) 13:47:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:47:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x24020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:18 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xab01}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x1f}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) [ 609.695135] x_tables: duplicate underflow at hook 2 13:47:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x28020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:47:18 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 609.744635] IPVS: ftp: loaded support on port[0] = 21 [ 609.752027] x_tables: duplicate underflow at hook 2 [ 609.758031] hfs: umask requires a value [ 609.762017] hfs: unable to parse mount options 13:47:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xb4, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1524}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x95c9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff0d}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x46}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xf649}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x14e}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ca}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x800}, 0x4000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./file1\x00', 0x143042, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x8100000, 0x0) splice(r4, 0x0, r2, 0x0, 0x8, 0x2) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x2d8) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}}) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @private}, &(0x7f0000000000)=0xe, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000680)={'batadv0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}}) 13:47:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x7fffffdf}, 0x14) shutdown(r0, 0x1) 13:47:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2a020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:19 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x100000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 13:47:19 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x600, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:19 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x34000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2c010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:19 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0xf00}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 610.855913] IPVS: ftp: loaded support on port[0] = 21 13:47:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x2c020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 610.889325] IPVS: ftp: loaded support on port[0] = 21 13:47:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 13:47:20 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x2d, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:20 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x400300}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x32000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 611.099580] IPVS: ftp: loaded support on port[0] = 21 13:47:20 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x200000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x3f000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:20 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf0ffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x40000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 611.966462] IPVS: ftp: loaded support on port[0] = 21 13:47:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x1000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4a020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 612.197556] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.221573] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 13:47:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x2000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 612.264581] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.303552] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.337009] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.385514] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.433372] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.465884] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.501871] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.539784] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.570878] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.600180] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.632182] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.651844] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.670270] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.691306] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.711907] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.751284] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.782701] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.807521] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.834196] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 13:47:21 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x300000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4c010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x3000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 612.866678] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 612.893932] hid-generic 0000:0000:0000.002D: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 613.099823] IPVS: ftp: loaded support on port[0] = 21 13:47:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x4e010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:22 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x4000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x50010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 613.418774] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.433806] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.442978] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.465823] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.492884] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.510834] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.519100] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 13:47:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x52000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 613.550444] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.590497] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.612619] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.616107] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.631656] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.634103] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 13:47:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x60030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 613.666985] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.680481] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.701121] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.715818] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.736420] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.737376] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.759167] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 13:47:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 613.794966] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.824440] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.826452] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.847739] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.875456] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.876015] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.909923] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.923415] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.943152] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 613.972316] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 613.983918] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 614.013697] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 614.015625] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.047823] hid-generic 0000:0000:0000.002E: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 614.071468] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.103192] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.135393] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.171384] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.201689] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.234616] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.265977] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.296580] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.331339] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.358516] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.388594] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 614.418634] hid-generic 0000:0000:0000.002F: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:23 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x600000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x62010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:23 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x5000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x62020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 614.700964] IPVS: ftp: loaded support on port[0] = 21 13:47:23 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x6000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 614.874906] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 614.894273] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 614.941575] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 614.981064] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 13:47:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6a010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 615.020451] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.020986] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.052926] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.061078] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 13:47:24 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x8000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 615.095717] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.114628] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.132976] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 13:47:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x6e020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 615.158564] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.163665] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.189909] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.209693] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.220359] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.244742] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.255520] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 13:47:24 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x9000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 615.282944] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.311434] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.317916] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.345696] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.353647] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.365783] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.373182] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.388309] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.390238] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.406701] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.421309] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.433901] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.446561] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.479883] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.493478] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.493492] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.508262] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.520511] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.536209] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.551297] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.551710] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.558173] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.571793] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 615.593467] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.596768] hid-generic 0000:0000:0000.0031: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 615.621261] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.643777] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 615.678780] hid-generic 0000:0000:0000.0030: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:25 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xa00000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x70000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xa000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 616.185163] IPVS: ftp: loaded support on port[0] = 21 13:47:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x72020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xb000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 616.442187] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.460401] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 13:47:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x76030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 616.501887] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.541524] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.572247] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.597627] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.604321] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.604739] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 13:47:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xc000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x80030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 616.662746] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.669158] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.705655] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.714706] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.741032] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.750525] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 13:47:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x82010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 616.776266] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.783931] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.797697] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.830971] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.832174] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.870740] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.883247] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.894459] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.911978] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.928885] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 616.954658] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.985242] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 616.988984] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.015707] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.023322] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.054326] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.059801] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.091004] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.092140] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.142202] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.153922] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.157432] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.170997] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.177803] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.184558] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.191647] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.196147] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.198431] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.198449] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 617.223232] hid-generic 0000:0000:0000.0033: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 617.296095] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 [ 617.335826] hid-generic 0000:0000:0000.0032: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:26 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xf00000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:26 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xe000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x92020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 617.721167] IPVS: ftp: loaded support on port[0] = 21 13:47:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x98030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:26 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 617.915165] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 617.934957] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 617.962830] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 13:47:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x9f020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 618.007180] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.030401] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.053348] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.056390] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.083122] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.093136] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 13:47:27 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x10000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xa4010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 618.107830] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.129442] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.142891] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.154522] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.172199] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.185984] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.187510] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.201445] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.213367] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.229062] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.230188] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.252686] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.264224] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.269222] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.276453] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.284977] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.297230] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.307205] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.314054] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.320978] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 618.324240] hid-generic 0000:0000:0000.0034: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 618.388476] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.421484] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.431994] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.441660] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.451830] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.458933] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.465881] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.472901] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.480591] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 13:47:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xaa000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 618.496840] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.542080] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.555073] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.576172] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.599782] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.619156] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 618.644581] hid-generic 0000:0000:0000.0035: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:27 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x1100000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xba000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:27 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x1f000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xbe010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 618.961347] IPVS: ftp: loaded support on port[0] = 21 13:47:28 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x20000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 619.130418] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.141711] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.168861] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.193040] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.214937] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.234740] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 13:47:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xc6010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 619.265524] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.275867] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.288518] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.291603] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.321476] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.339148] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.343748] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.367704] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.384747] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.397726] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.402793] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.415318] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.431009] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.440886] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.448487] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.452535] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.461628] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.467226] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.473743] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.482044] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.482062] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.482079] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.482096] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 619.489064] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.504850] hid-generic 0000:0000:0000.0036: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 619.534195] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.545998] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.557597] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.573746] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 13:47:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 619.581685] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.589028] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.595981] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.603193] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.610438] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.617475] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 13:47:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xcd000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 619.636762] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.644319] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.666239] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.689069] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 619.727039] hid-generic 0000:0000:0000.0037: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 619.897563] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 619.913370] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 619.947978] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 619.979130] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.001162] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.024668] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.049710] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.071887] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.094238] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.119953] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.141989] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.145298] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.162362] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.165860] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.176957] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.194087] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.212136] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.222678] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.236464] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.244694] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.245287] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.251655] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.264936] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.272063] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.279077] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.285835] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.292631] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.299440] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.306335] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.313095] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.319897] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.326760] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.332763] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.333503] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.346951] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.353712] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.360522] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.367491] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 620.377723] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.389221] hid-generic 0000:0000:0000.0039: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 620.416232] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.451492] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 13:47:29 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x2c01000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:29 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x20010000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xd6020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 620.481362] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.499691] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 13:47:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 620.525130] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 620.545837] hid-generic 0000:0000:0000.0038: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 620.688954] IPVS: ftp: loaded support on port[0] = 21 13:47:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:29 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x60000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xe8030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 620.980069] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 620.987412] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 620.994099] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.015007] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 13:47:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xea020000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 621.050260] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.071868] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.090633] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.121058] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.122384] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.155278] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 13:47:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xec000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 621.167245] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.186233] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.199640] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.203298] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.225755] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.232861] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.253398] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.260779] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 13:47:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xf0030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 621.299984] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.310617] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.335392] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.351814] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.361281] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.386240] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 13:47:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 621.411337] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.428676] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.442179] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.467720] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.467976] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.516091] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.519437] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.543062] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.568402] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.584360] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.591878] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.620607] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 621.633917] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.652218] hid-generic 0000:0000:0000.003A: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 621.672877] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.696557] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.731933] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.754455] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.763392] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.770652] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.777518] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 621.789994] hid-generic 0000:0000:0000.003B: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:31 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x3f00000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xf3030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:31 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x65580000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xfc030000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 622.122985] IPVS: ftp: loaded support on port[0] = 21 13:47:31 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x81000000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xfe010000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 622.370934] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.397416] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.438736] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.452505] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.475659] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.486022] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 13:47:31 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x88a8ffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 622.513949] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.546956] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.551695] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 13:47:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xff000000, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 622.580157] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.614279] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.623094] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.651038] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.681828] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.683056] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 13:47:31 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x9effffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 622.715476] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.731243] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.742404] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.774200] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.788030] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.800825] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.815271] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.833197] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.833309] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.861732] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.869585] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.877447] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.889599] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.898850] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.905669] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.908766] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.915468] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.935950] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.946281] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.967307] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 622.971429] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.990111] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 622.996112] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 623.013084] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 623.027050] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 623.033309] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 623.052292] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 623.057117] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 623.074147] hid-generic 0000:0000:0000.003D: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 623.093421] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 623.122569] hid-generic 0000:0000:0000.003C: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:32 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0xdc05000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0xffff1f00, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xab010000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 623.700993] IPVS: ftp: loaded support on port[0] = 21 13:47:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xf0ffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 623.916600] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 623.923315] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 13:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 623.967679] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 623.974401] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 623.979966] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.029793] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.034256] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.060474] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.064697] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 13:47:33 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xfcffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 624.087755] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.088583] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.124048] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.158692] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.172922] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.193292] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 13:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 624.211582] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.229184] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.241790] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.269203] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.272688] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.291022] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.295121] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.313882] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.330438] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.332488] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.342853] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.356530] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.380979] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.390805] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.393212] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.402569] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.415509] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.429906] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.433194] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.442134] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 624.454613] hid-generic 0000:0000:0000.003E: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 624.464210] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.490416] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.509362] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.528348] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.544968] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.552380] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.567956] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.584971] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.599692] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 624.622513] hid-generic 0000:0000:0000.003F: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:33 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x3, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:33 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xffffa888}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x32, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 624.831292] IPVS: ftp: loaded support on port[0] = 21 13:47:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x52, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xfffff000}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x70, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 625.226935] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.233659] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.277627] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.311915] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.317649] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.332337] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.350544] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 13:47:34 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xffffff7f}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 625.379395] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.382729] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.412556] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.422165] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 13:47:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xaa, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 625.445369] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.468498] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.472463] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.503412] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.531758] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.532986] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 13:47:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xba, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 625.562265] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.563630] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.620651] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.633176] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.657537] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.660488] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.692786] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.718063] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.724925] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.748319] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.759222] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.763710] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.766506] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.780210] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.797036] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.809570] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.816539] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.817175] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.841775] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.853761] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.855751] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.877368] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.890577] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.892701] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 [ 625.915631] hid-generic 0000:0000:0000.0041: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 625.925051] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.962980] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 625.995887] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 626.030680] hid-generic 0000:0000:0000.0040: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:35 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x8, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xffffff9e}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xcd, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 626.401045] IPVS: ftp: loaded support on port[0] = 21 13:47:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xec, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xfffffff0}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 626.592023] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.610206] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 13:47:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x12c, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 626.636482] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 626.643203] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 626.662938] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.702439] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.716165] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 626.742573] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.753564] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 626.775301] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.784120] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 13:47:35 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xfffffffc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x14c, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 626.812258] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.846982] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.847911] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 626.879085] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.912260] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.912348] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 13:47:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x14e, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 626.947898] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.977415] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 626.989485] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.013417] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.017583] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.051812] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.056396] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.072253] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.077536] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.098936] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.119757] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.146074] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.158815] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.167995] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.184815] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.187476] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.209392] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.222033] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.242939] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.250107] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.257784] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.264531] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.271317] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 627.274917] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.290098] hid-generic 0000:0000:0000.0043: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 627.299441] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.337543] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.371943] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 627.401757] hid-generic 0000:0000:0000.0042: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:36 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0xffffffff}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x150, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 627.709057] IPVS: ftp: loaded support on port[0] = 21 13:47:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x162, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 627.913401] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 627.930204] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 627.973075] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 627.975427] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 627.988119] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 13:47:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x16a, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 628.045182] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.048845] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.078910] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 13:47:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x2}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 628.112465] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.120226] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.150663] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.157138] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.177890] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.193039] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.203636] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 13:47:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x182, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 628.232297] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.234163] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.265982] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.270793] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 13:47:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x3}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 628.301450] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.312670] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.323172] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.329152] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.339485] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.363893] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.375022] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.395389] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.402405] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.414800] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.431358] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.437213] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.459188] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.462189] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.486590] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.496296] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.512898] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.532675] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.538942] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.559060] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 628.560125] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.581154] hid-generic 0000:0000:0000.0044: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 628.583435] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.605367] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.623717] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.647279] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 628.669038] hid-generic 0000:0000:0000.0045: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:37 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0xb, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1a4, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:37 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000540)=ANY=[], 0x41) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$vsock_stream(r6, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047457, &(0x7f0000000000)) 13:47:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x4}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:37 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 629.018728] IPVS: ftp: loaded support on port[0] = 21 [ 629.038552] IPVS: ftp: loaded support on port[0] = 21 [ 629.054476] IPVS: ftp: loaded support on port[0] = 21 13:47:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1be, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:38 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x5}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1c6, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 629.317956] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.324666] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.383387] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.416859] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.442002] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 13:47:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1fe, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 629.531117] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.574627] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.610189] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.630364] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.662570] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.699960] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.719394] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.735773] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.755632] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.771056] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.785323] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 13:47:38 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 629.800726] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.827698] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.846780] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.860269] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.862549] FAULT_INJECTION: forcing a failure. [ 629.862549] name failslab, interval 1, probability 0, space 0, times 0 [ 629.878196] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.907172] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 629.910526] CPU: 0 PID: 13651 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 629.921793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.931145] Call Trace: [ 629.933731] dump_stack+0x1fc/0x2fe [ 629.937352] should_fail.cold+0xa/0x14 [ 629.941230] ? setup_fault_attr+0x200/0x200 [ 629.945540] ? lock_acquire+0x170/0x3c0 [ 629.949508] __should_failslab+0x115/0x180 [ 629.953746] should_failslab+0x5/0xf [ 629.957453] __kmalloc+0x2ab/0x3c0 [ 629.960993] ? __se_sys_memfd_create+0xf8/0x440 [ 629.965644] __se_sys_memfd_create+0xf8/0x440 [ 629.970121] ? memfd_file_seals_ptr+0x150/0x150 [ 629.974781] ? posix_timer_fn+0x3d0/0x3d0 [ 629.978934] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.983672] ? trace_hardirqs_off_caller+0x69/0x210 [ 629.988680] ? do_syscall_64+0x21/0x620 [ 629.992657] do_syscall_64+0xf9/0x620 [ 629.996447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.001616] RIP: 0033:0x45c369 [ 630.004798] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.023681] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 630.031373] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 [ 630.038633] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 [ 630.045981] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 630.053239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 630.060493] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 630.077681] hid-generic 0000:0000:0000.0046: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x203, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:39 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x6}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:39 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x0, @dev}, 0x10) shutdown(r0, 0x1) [ 630.369373] IPVS: ftp: loaded support on port[0] = 21 13:47:39 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:39 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x224, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:39 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x8}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 630.513744] FAULT_INJECTION: forcing a failure. [ 630.513744] name failslab, interval 1, probability 0, space 0, times 0 [ 630.571121] CPU: 0 PID: 13685 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 630.574897] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.579048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.579055] Call Trace: [ 630.579075] dump_stack+0x1fc/0x2fe [ 630.579096] should_fail.cold+0xa/0x14 [ 630.579114] ? setup_fault_attr+0x200/0x200 [ 630.579130] ? lock_acquire+0x170/0x3c0 [ 630.579163] __should_failslab+0x115/0x180 [ 630.579179] should_failslab+0x5/0xf [ 630.579207] kmem_cache_alloc+0x277/0x370 [ 630.579225] ? shmem_destroy_callback+0xb0/0xb0 [ 630.627572] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.630246] shmem_alloc_inode+0x18/0x40 [ 630.630259] ? shmem_destroy_callback+0xb0/0xb0 [ 630.630274] alloc_inode+0x5d/0x180 [ 630.649237] new_inode+0x1d/0xf0 [ 630.652696] shmem_get_inode+0x96/0x8d0 [ 630.656683] __shmem_file_setup.part.0+0x7a/0x2b0 [ 630.661534] shmem_file_setup+0x61/0x90 [ 630.665521] __se_sys_memfd_create+0x26b/0x440 [ 630.670110] ? memfd_file_seals_ptr+0x150/0x150 [ 630.673674] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.674774] ? posix_timer_fn+0x3d0/0x3d0 [ 630.674791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.674803] ? trace_hardirqs_off_caller+0x69/0x210 [ 630.674819] ? do_syscall_64+0x21/0x620 [ 630.690569] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.695493] do_syscall_64+0xf9/0x620 [ 630.695516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.695527] RIP: 0033:0x45c369 [ 630.695540] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.695551] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 630.705632] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.706154] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 [ 630.706166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 13:47:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x228, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 630.717101] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.718309] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 630.718317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.718325] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c 13:47:39 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 630.825147] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.832160] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.858872] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.894048] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.919231] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.922266] FAULT_INJECTION: forcing a failure. [ 630.922266] name failslab, interval 1, probability 0, space 0, times 0 [ 630.942922] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.959773] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.967308] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.987713] CPU: 0 PID: 13727 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 630.990809] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 630.995605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.995611] Call Trace: [ 630.995631] dump_stack+0x1fc/0x2fe [ 630.995655] should_fail.cold+0xa/0x14 [ 630.995672] ? setup_fault_attr+0x200/0x200 [ 630.995686] ? get_pid_task+0xf4/0x190 [ 630.995707] __should_failslab+0x115/0x180 [ 631.005903] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.011708] should_failslab+0x5/0xf [ 631.011726] kmem_cache_alloc+0x277/0x370 [ 631.011745] selinux_inode_alloc_security+0xb1/0x2a0 [ 631.011761] security_inode_alloc+0x67/0xc0 [ 631.021169] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.021824] inode_init_always+0x5a3/0xb70 [ 631.021841] alloc_inode+0x7a/0x180 [ 631.032461] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.034237] new_inode+0x1d/0xf0 [ 631.034255] shmem_get_inode+0x96/0x8d0 [ 631.034277] __shmem_file_setup.part.0+0x7a/0x2b0 [ 631.034294] shmem_file_setup+0x61/0x90 [ 631.067767] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.069272] __se_sys_memfd_create+0x26b/0x440 [ 631.069291] ? memfd_file_seals_ptr+0x150/0x150 [ 631.069310] ? posix_timer_fn+0x3d0/0x3d0 [ 631.069327] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.073119] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.079577] ? trace_hardirqs_off_caller+0x69/0x210 [ 631.079595] ? do_syscall_64+0x21/0x620 [ 631.079613] do_syscall_64+0xf9/0x620 [ 631.079643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.079656] RIP: 0033:0x45c369 [ 631.083181] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 631.086954] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.086963] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 631.086977] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 13:47:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x22a, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 631.086985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 [ 631.086994] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 631.087014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 631.087022] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 631.220757] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 13:47:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x9}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 631.260313] hid-generic 0000:0000:0000.0047: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:40 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:40 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 631.429052] FAULT_INJECTION: forcing a failure. [ 631.429052] name failslab, interval 1, probability 0, space 0, times 0 [ 631.431562] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.460157] CPU: 0 PID: 13748 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 631.460533] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.468071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.468077] Call Trace: [ 631.468099] dump_stack+0x1fc/0x2fe [ 631.468122] should_fail.cold+0xa/0x14 [ 631.468140] ? setup_fault_attr+0x200/0x200 [ 631.468156] ? lock_acquire+0x170/0x3c0 [ 631.468179] __should_failslab+0x115/0x180 [ 631.468195] should_failslab+0x5/0xf [ 631.468210] kmem_cache_alloc+0x277/0x370 [ 631.468226] __d_alloc+0x2b/0xa10 [ 631.468245] d_alloc_pseudo+0x19/0x70 [ 631.468261] alloc_file_pseudo+0xc6/0x250 [ 631.468274] ? check_preemption_disabled+0x41/0x280 [ 631.468288] ? alloc_file+0x4d0/0x4d0 [ 631.483834] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.484325] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 631.490313] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.490516] ? shmem_get_inode+0x44c/0x8d0 [ 631.498979] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.502661] __shmem_file_setup.part.0+0x102/0x2b0 [ 631.502680] shmem_file_setup+0x61/0x90 [ 631.515784] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.518171] __se_sys_memfd_create+0x26b/0x440 [ 631.518189] ? memfd_file_seals_ptr+0x150/0x150 [ 631.524250] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.526102] ? posix_timer_fn+0x3d0/0x3d0 [ 631.526119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.526133] ? trace_hardirqs_off_caller+0x69/0x210 [ 631.526150] ? do_syscall_64+0x21/0x620 [ 631.533396] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.534935] do_syscall_64+0xf9/0x620 13:47:40 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x14, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x22c, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 631.534954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.534986] RIP: 0033:0x45c369 [ 631.553933] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.558108] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.558116] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 631.558129] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 [ 631.558138] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 [ 631.558145] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 631.558156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 631.574843] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.580339] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 631.644219] IPVS: ftp: loaded support on port[0] = 21 13:47:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x24a, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:40 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 631.941587] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 631.945495] FAULT_INJECTION: forcing a failure. [ 631.945495] name failslab, interval 1, probability 0, space 0, times 0 [ 631.955873] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.018158] CPU: 0 PID: 13789 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 632.026074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.035427] Call Trace: [ 632.038020] dump_stack+0x1fc/0x2fe [ 632.039559] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.041654] should_fail.cold+0xa/0x14 [ 632.041674] ? setup_fault_attr+0x200/0x200 [ 632.041693] ? lock_acquire+0x170/0x3c0 [ 632.060499] __should_failslab+0x115/0x180 [ 632.064749] should_failslab+0x5/0xf [ 632.066009] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.068466] kmem_cache_alloc+0x277/0x370 [ 632.068485] __alloc_file+0x21/0x330 [ 632.068500] alloc_empty_file+0x6d/0x170 [ 632.068515] alloc_file+0x5e/0x4d0 [ 632.090587] alloc_file_pseudo+0x165/0x250 [ 632.092526] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.094826] ? alloc_file+0x4d0/0x4d0 [ 632.094846] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 632.094863] ? shmem_get_inode+0x44c/0x8d0 [ 632.094882] __shmem_file_setup.part.0+0x102/0x2b0 [ 632.101684] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.105317] shmem_file_setup+0x61/0x90 [ 632.105335] __se_sys_memfd_create+0x26b/0x440 [ 632.105351] ? memfd_file_seals_ptr+0x150/0x150 [ 632.105363] ? posix_timer_fn+0x3d0/0x3d0 [ 632.105380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.111101] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.115203] ? trace_hardirqs_off_caller+0x69/0x210 [ 632.115220] ? do_syscall_64+0x21/0x620 [ 632.115238] do_syscall_64+0xf9/0x620 [ 632.115258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.115276] RIP: 0033:0x45c369 [ 632.120318] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.126825] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.126834] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 632.126849] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 13:47:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x262, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 632.126857] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 [ 632.126865] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 632.126873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 632.126881] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c 13:47:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x26e, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 632.291343] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.317633] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.342346] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 632.377851] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 13:47:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x272, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0xa}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 632.424070] hid-generic 0000:0000:0000.0048: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:41 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 632.532575] FAULT_INJECTION: forcing a failure. [ 632.532575] name failslab, interval 1, probability 0, space 0, times 0 13:47:41 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x3}], 0x1) 13:47:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 632.583624] CPU: 0 PID: 13824 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 632.591531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.600883] Call Trace: [ 632.603478] dump_stack+0x1fc/0x2fe [ 632.607124] should_fail.cold+0xa/0x14 [ 632.611024] ? setup_fault_attr+0x200/0x200 [ 632.615351] ? lock_acquire+0x170/0x3c0 [ 632.619338] __should_failslab+0x115/0x180 [ 632.623583] should_failslab+0x5/0xf [ 632.627307] kmem_cache_alloc+0x277/0x370 [ 632.631467] selinux_file_alloc_security+0xaf/0x190 [ 632.636490] security_file_alloc+0x40/0x90 [ 632.640236] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 632.640730] __alloc_file+0xc9/0x330 [ 632.651085] alloc_empty_file+0x6d/0x170 [ 632.655150] alloc_file+0x5e/0x4d0 [ 632.657703] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 632.658697] alloc_file_pseudo+0x165/0x250 [ 632.669572] ? alloc_file+0x4d0/0x4d0 [ 632.673384] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 632.679019] ? shmem_get_inode+0x44c/0x8d0 [ 632.683358] __shmem_file_setup.part.0+0x102/0x2b0 [ 632.688299] shmem_file_setup+0x61/0x90 [ 632.692283] __se_sys_memfd_create+0x26b/0x440 [ 632.693687] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 632.696889] ? memfd_file_seals_ptr+0x150/0x150 [ 632.696904] ? posix_timer_fn+0x3d0/0x3d0 [ 632.696919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.696933] ? trace_hardirqs_off_caller+0x69/0x210 [ 632.696949] ? do_syscall_64+0x21/0x620 [ 632.715354] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 632.717139] do_syscall_64+0xf9/0x620 [ 632.717160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.717173] RIP: 0033:0x45c369 [ 632.724477] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 632.726153] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.726161] RSP: 002b:00007f2fb7900a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:47:41 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) 13:47:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x292, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 632.726175] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c369 [ 632.726184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c14d1 [ 632.726192] RBP: 00007f2fb7900ca0 R08: 0000000000000000 R09: 0000000000000000 [ 632.726200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 632.726212] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 632.735178] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 13:47:41 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x29f, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 632.917409] IPVS: ftp: loaded support on port[0] = 21 13:47:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2d6, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:42 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2ea, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:42 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x300, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 633.197765] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 13:47:42 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 633.256582] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.294373] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.323104] FAULT_INJECTION: forcing a failure. [ 633.323104] name failslab, interval 1, probability 0, space 0, times 0 [ 633.325057] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.369719] CPU: 0 PID: 13906 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 633.377624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.386992] Call Trace: [ 633.389601] dump_stack+0x1fc/0x2fe [ 633.393280] should_fail.cold+0xa/0x14 [ 633.396192] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.397172] ? setup_fault_attr+0x200/0x200 [ 633.397189] ? lock_acquire+0x170/0x3c0 [ 633.397211] __should_failslab+0x115/0x180 [ 633.405102] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.408170] should_failslab+0x5/0xf [ 633.408187] kmem_cache_alloc+0x277/0x370 [ 633.408203] getname_flags+0xce/0x590 [ 633.408223] do_sys_open+0x26c/0x520 [ 633.424419] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.426752] ? filp_open+0x70/0x70 [ 633.426773] ? check_preemption_disabled+0x41/0x280 [ 633.426792] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.426805] ? trace_hardirqs_off_caller+0x69/0x210 [ 633.426821] ? do_syscall_64+0x21/0x620 [ 633.447961] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.448606] do_syscall_64+0xf9/0x620 [ 633.465252] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.467306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.467321] RIP: 0033:0x4160e1 [ 633.476222] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.477754] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 633.477762] RSP: 002b:00007f2fb7900a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 633.485648] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.489644] RAX: ffffffffffffffda RBX: 00007f2fb79016d4 RCX: 00000000004160e1 [ 633.489652] RDX: 00007f2fb7900afa RSI: 0000000000000002 RDI: 00007f2fb7900af0 [ 633.489659] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 633.489666] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 633.489673] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 633.596998] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.603896] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.611882] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.636075] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 13:47:42 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x20000335}], 0x1) 13:47:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x302, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 633.654662] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 [ 633.686270] hid-generic 0000:0000:0000.0049: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 633.798819] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.813101] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.874570] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.885137] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.891892] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.899304] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.915031] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.922377] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.936064] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.952944] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.973541] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.988274] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 633.996514] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.019306] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.044998] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.071960] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.081444] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.088864] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.095684] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.102450] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.109492] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.116353] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 634.129224] hid-generic 0000:0000:0000.004A: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 634.163535] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 13:47:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x318, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:43 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x2, @dev}, 0x10) shutdown(r0, 0x1) 13:47:43 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 634.189738] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.214898] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.223309] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.260847] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.267496] FAULT_INJECTION: forcing a failure. [ 634.267496] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 634.279343] CPU: 0 PID: 13960 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 634.287227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.296599] Call Trace: [ 634.296979] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.299292] dump_stack+0x1fc/0x2fe [ 634.299315] should_fail.cold+0xa/0x14 [ 634.299331] ? setup_fault_attr+0x200/0x200 [ 634.317794] __alloc_pages_nodemask+0x239/0x2890 [ 634.322565] ? avc_has_perm+0x227/0x410 [ 634.326558] ? __lock_acquire+0x6de/0x3ff0 [ 634.330809] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 634.335658] ? current_time+0x6f/0x1c0 [ 634.339563] ? shmem_setattr+0x2d0/0xc90 [ 634.343634] ? timespec64_trunc+0xf2/0x190 [ 634.347880] ? inode_init_owner+0x330/0x330 [ 634.349631] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.352201] ? fsnotify+0x706/0xe20 [ 634.352226] cache_grow_begin+0xa4/0x8a0 [ 634.352245] ? setup_fault_attr+0x200/0x200 [ 634.370883] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 634.375649] cache_alloc_refill+0x273/0x340 [ 634.379978] kmem_cache_alloc+0x346/0x370 [ 634.384179] getname_flags+0xce/0x590 [ 634.387992] do_sys_open+0x26c/0x520 [ 634.391716] ? filp_open+0x70/0x70 [ 634.395259] ? check_preemption_disabled+0x41/0x280 [ 634.400282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 634.405054] ? trace_hardirqs_off_caller+0x69/0x210 [ 634.410078] ? do_syscall_64+0x21/0x620 [ 634.412067] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.414099] do_syscall_64+0xf9/0x620 [ 634.414120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.414132] RIP: 0033:0x4160e1 [ 634.414148] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 634.434531] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 13:47:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x360, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 634.451820] RSP: 002b:00007f2fb7900a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.451834] RAX: ffffffffffffffda RBX: 00007f2fb79016d4 RCX: 00000000004160e1 [ 634.451843] RDX: 00007f2fb7900afa RSI: 0000000000000002 RDI: 00007f2fb7900af0 [ 634.451851] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 634.451859] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 634.451868] R13: 00007ffffc34663f R14: 00007f2fb79019c0 R15: 000000000078bf0c [ 634.517933] IPVS: ftp: loaded support on port[0] = 21 13:47:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x376, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x380, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 634.691095] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.701841] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.751585] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.776448] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 13:47:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 634.822646] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.861627] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.892723] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.923833] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.946474] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.965913] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.981732] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 634.993190] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 635.009623] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 13:47:44 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x7ffff000}], 0x1) 13:47:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x398, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 635.057221] hid-generic 0000:0000:0000.004B: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 635.185762] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.193366] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.256665] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.270989] SELinux: duplicate or incompatible mount options [ 635.306430] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.351873] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.386478] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.412344] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.427017] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.444516] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.459336] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.474151] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.488690] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.513712] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.540787] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.555560] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 13:47:44 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x3, @dev}, 0x10) shutdown(r0, 0x1) 13:47:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3e8, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 635.570167] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.578701] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.599758] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.646018] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.678427] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.681782] SELinux: duplicate or incompatible mount options 13:47:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3f0, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 635.706968] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.723198] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 635.728640] IPVS: ftp: loaded support on port[0] = 21 [ 635.744066] hid-generic 0000:0000:0000.004C: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:44 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x3}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 635.784102] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.792452] SELinux: duplicate or incompatible mount options 13:47:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 635.855826] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.891886] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.906701] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.925593] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.964091] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 635.977808] SELinux: duplicate or incompatible mount options [ 636.001348] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.062889] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.087277] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.115397] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.128910] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.156075] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.169409] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.184032] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.222542] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.229364] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.236559] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.243306] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.250791] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.257582] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.264325] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 13:47:45 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x8) 13:47:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3f3, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:45 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 636.271113] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 636.289060] hid-generic 0000:0000:0000.004D: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 636.396620] SELinux: duplicate or incompatible mount options [ 636.409960] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.442794] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.464122] SELinux: duplicate or incompatible mount options [ 636.509727] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.571117] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.619585] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.650480] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.664040] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.678825] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.700783] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.730028] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.756455] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.766796] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.773631] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.780516] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.788118] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.794985] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.801807] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.808659] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.815526] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.822344] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.829282] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.836117] hid-generic 0000:0000:0000.004E: unknown main item tag 0x0 [ 636.849079] hid-generic 0000:0000:0000.004E: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 636.878639] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.901282] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.910860] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.917926] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.925921] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.932723] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.939992] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.946923] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.953709] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.960610] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.967473] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.974258] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.981173] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.988005] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 636.994844] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 13:47:46 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x6, @dev}, 0x10) shutdown(r0, 0x1) 13:47:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3fc, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:46 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x5}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 637.001636] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.008646] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.015481] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.022271] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.029101] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.035931] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.042720] hid-generic 0000:0000:0000.004F: unknown main item tag 0x0 [ 637.069420] hid-generic 0000:0000:0000.004F: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:46 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x300) 13:47:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1803, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 637.120560] SELinux: duplicate or incompatible mount options [ 637.138040] IPVS: ftp: loaded support on port[0] = 21 13:47:46 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x6}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 637.181602] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.214879] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.215596] SELinux: duplicate or incompatible mount options 13:47:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 637.288824] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.327938] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.388806] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.413317] SELinux: duplicate or incompatible mount options [ 637.438096] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.468946] SELinux: duplicate or incompatible mount options [ 637.485856] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 13:47:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2402, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 637.537244] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.585085] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.599581] SELinux: duplicate or incompatible mount options [ 637.608498] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.629527] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.655416] SELinux: duplicate or incompatible mount options [ 637.664237] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.672530] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.679462] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.687075] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.693929] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.700856] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.721318] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.729864] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.736791] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.751067] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.758002] hid-generic 0000:0000:0000.0050: unknown main item tag 0x0 [ 637.777377] hid-generic 0000:0000:0000.0050: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 637.808232] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.823951] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.857816] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.885295] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.900067] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.914788] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.968645] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 637.996586] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.026615] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.044000] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.060859] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.077560] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.093975] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 13:47:47 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0xa, @dev}, 0x10) shutdown(r0, 0x1) 13:47:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2802, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:47 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x8}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 638.136474] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.157274] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.169521] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.196228] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.230902] SELinux: duplicate or incompatible mount options [ 638.231643] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.258197] IPVS: ftp: loaded support on port[0] = 21 [ 638.266853] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.295760] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.303807] SELinux: duplicate or incompatible mount options [ 638.314861] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.336099] hid-generic 0000:0000:0000.0051: unknown main item tag 0x0 [ 638.353550] hid-generic 0000:0000:0000.0051: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2a02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:47 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r1, &(0x7f0000000340)="c83a1cda4df109cd1b000e79276849c8d747be6781647cc5a0a1fae498895f6b42b97f8bbb932accf33b69336a983f6790b93b82aea92f2391a69249b79634eda63a70fa6719f2ca4aa311e79e5a3d3bc4f85e171f6e50799d7e2cde7d11289dbce07f8e922b6cfb8ee215819574480b6938b23180b7e95643128d5fd12ae893d433a5cb9e47d9eb70b01d92e3be750588e6a17daf0637e304d818688b75db83717e17faf8a35b3c10a2a7cbc12cf3ecf44f7c9e35", 0xb5, 0x40000, &(0x7f0000000080)={0xa, 0x4e22, 0x8001, @private1={0xfc, 0x1, [], 0x1}, 0x4}, 0x1c) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2c, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:47 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x9}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 638.484036] SELinux: duplicate or incompatible mount options 13:47:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2c01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 638.542889] SELinux: duplicate or incompatible mount options [ 638.547177] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 13:47:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 638.591283] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.641107] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.697737] SELinux: duplicate or incompatible mount options [ 638.698023] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 13:47:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2c02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 638.741884] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.752089] SELinux: duplicate or incompatible mount options [ 638.770713] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.807068] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.837013] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.858549] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.884115] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.912539] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.927510] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.939995] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.960598] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.974476] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 638.989063] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.003840] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 13:47:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0xf, @dev}, 0x10) shutdown(r0, 0x1) 13:47:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xa}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3200, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 639.018607] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.060606] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.089962] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.112671] SELinux: duplicate or incompatible mount options [ 639.138646] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.156156] IPVS: ftp: loaded support on port[0] = 21 [ 639.166657] hid-generic 0000:0000:0000.0052: unknown main item tag 0x0 [ 639.185114] SELinux: duplicate or incompatible mount options [ 639.255028] hid-generic 0000:0000:0000.0052: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 639.267155] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.273885] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.300653] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.331958] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.351523] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.393559] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.425258] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.443140] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.472583] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.513523] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.536226] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.544293] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.563313] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.580675] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.609341] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.631552] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.647871] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.666865] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.691724] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.702972] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.709747] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.735961] hid-generic 0000:0000:0000.0053: unknown main item tag 0x0 [ 639.756510] hid-generic 0000:0000:0000.0053: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3f00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:48 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:48 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) get_thread_area(&(0x7f0000000080)={0xffffffff, 0x100000, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x11, @dev}, 0x10) shutdown(r0, 0x1) [ 639.867700] IPVS: ftp: loaded support on port[0] = 21 [ 639.890840] SELinux: duplicate or incompatible mount options 13:47:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 639.980983] SELinux: duplicate or incompatible mount options 13:47:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:49 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4a02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 640.183642] SELinux: duplicate or incompatible mount options [ 640.234291] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.241009] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.266846] SELinux: duplicate or incompatible mount options [ 640.273812] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 13:47:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4c01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 640.293208] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 13:47:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 640.334620] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.374854] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.401019] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.428396] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.428519] SELinux: duplicate or incompatible mount options [ 640.455813] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.470536] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.482845] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.489893] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.497293] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.504186] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.518396] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.535174] SELinux: duplicate or incompatible mount options [ 640.537879] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.553940] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.561149] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.582188] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.600149] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.636774] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.662432] hid-generic 0000:0000:0000.0054: unknown main item tag 0x0 [ 640.693413] hid-generic 0000:0000:0000.0054: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:49 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4e01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:49 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x109800) fcntl$setlease(r1, 0x400, 0x2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) [ 640.809935] SELinux: duplicate or incompatible mount options [ 640.883825] SELinux: duplicate or incompatible mount options [ 640.918528] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 640.951616] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.007065] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.049307] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.086237] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.103218] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.117827] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.132416] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.147129] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 13:47:50 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x12c, @dev}, 0x10) shutdown(r0, 0x1) 13:47:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x5001, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:50 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 641.160611] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.196959] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 13:47:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x5200, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 641.215855] SELinux: duplicate or incompatible mount options [ 641.228574] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.251924] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.252852] IPVS: ftp: loaded support on port[0] = 21 [ 641.267447] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.289063] SELinux: duplicate or incompatible mount options 13:47:50 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 641.319821] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.334394] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.352688] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.387218] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.416632] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.431164] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.439203] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.462079] hid-generic 0000:0000:0000.0055: unknown main item tag 0x0 [ 641.472369] hid-generic 0000:0000:0000.0055: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 641.473788] SELinux: duplicate or incompatible mount options [ 641.496378] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.512588] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.527556] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.537565] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.550785] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.582838] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.593157] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.600240] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.608615] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.615484] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.616230] SELinux: duplicate or incompatible mount options [ 641.631617] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.639450] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.658737] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.672018] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.679381] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.686180] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.692941] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.700030] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.706994] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.724368] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.737804] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.770789] hid-generic 0000:0000:0000.0056: unknown main item tag 0x0 [ 641.814269] hid-generic 0000:0000:0000.0056: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6003, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:51 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB="030252171f550745866ff52fc9b8bfc25634bdc9836b4f6429b0f31cc8e17206f082defd7d26c32ab2495e7b8f0680a0f3efaac29c173f384390ca40ac72251a90748f4a82ac106dc3ea966db4f310e18d"]) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) fcntl$getownex(r4, 0x10, &(0x7f0000000080)) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r5, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r5, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/113, 0x71}, {&(0x7f00000001c0)=""/61, 0x3d}], 0x54) [ 642.098491] SELinux: duplicate or incompatible mount options [ 642.192038] SELinux: duplicate or incompatible mount options [ 642.198673] jfs: Unrecognized mount option "gid=0x00000000ffffffffRUEo/ɸV4ɃkOd)r}&*I^{œ?8C@r%tJmm" or missing value 13:47:51 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x300, @dev}, 0x10) shutdown(r0, 0x1) 13:47:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6201, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5988, 0x101300) write$UHID_CREATE2(r1, &(0x7f00000000c0)=ANY=[], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6202, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 642.502763] SELinux: duplicate or incompatible mount options [ 642.537245] IPVS: ftp: loaded support on port[0] = 21 13:47:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 642.570748] SELinux: duplicate or incompatible mount options 13:47:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6a01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:51 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6e02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 642.981051] SELinux: duplicate or incompatible mount options [ 643.061652] SELinux: duplicate or incompatible mount options 13:47:52 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x5dc, @dev}, 0x10) shutdown(r0, 0x1) 13:47:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:52 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x7000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:52 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b4000000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x7202, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 643.521640] SELinux: duplicate or incompatible mount options [ 643.549385] IPVS: ftp: loaded support on port[0] = 21 13:47:52 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 643.606422] SELinux: duplicate or incompatible mount options 13:47:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x7603, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 644.052258] SELinux: duplicate or incompatible mount options 13:47:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x8003, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 644.141450] SELinux: duplicate or incompatible mount options 13:47:53 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x600, @dev}, 0x10) shutdown(r0, 0x1) 13:47:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x8201, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 644.350419] SELinux: duplicate or incompatible mount options 13:47:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000080)=0x3091, 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x9202, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 644.390930] IPVS: ftp: loaded support on port[0] = 21 13:47:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 644.425225] SELinux: duplicate or incompatible mount options [ 644.498082] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.517440] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.547618] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.565919] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.588413] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.597834] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.613920] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.626757] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.643866] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.658493] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.673027] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.707382] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.722348] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.737268] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.752269] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.782867] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.800929] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.828031] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 13:47:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2c00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x9803, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:53 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 644.880812] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 644.946765] SELinux: duplicate or incompatible mount options [ 644.948299] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 13:47:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 645.016580] SELinux: duplicate or incompatible mount options [ 645.043005] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 645.106925] SELinux: duplicate or incompatible mount options [ 645.127163] hid-generic 0000:0000:0000.0057: unknown main item tag 0x0 [ 645.147669] SELinux: duplicate or incompatible mount options [ 645.185633] hid-generic 0000:0000:0000.0057: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 645.271567] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.309293] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 13:47:54 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0xa00, @dev}, 0x10) shutdown(r0, 0x1) 13:47:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x9f02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 645.335174] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.349665] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.397441] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.417281] IPVS: ftp: loaded support on port[0] = 21 [ 645.424761] SELinux: duplicate or incompatible mount options [ 645.449019] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.485145] SELinux: duplicate or incompatible mount options [ 645.503817] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.562402] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.608160] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.653504] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.687264] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.711580] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.722984] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.767641] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.814958] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.843805] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.865992] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.888242] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.911324] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.940134] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.956718] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 645.992759] hid-generic 0000:0000:0000.0058: unknown main item tag 0x0 [ 646.007532] hid-generic 0000:0000:0000.0058: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000c, 0x9, 0x3) 13:47:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xa401, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:55 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0xf00, @dev}, 0x10) shutdown(r0, 0x1) 13:47:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 646.089126] IPVS: ftp: loaded support on port[0] = 21 [ 646.096743] SELinux: duplicate or incompatible mount options [ 646.126544] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.167771] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.192548] SELinux: duplicate or incompatible mount options 13:47:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xaa00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 646.218607] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.239889] mmap: syz-executor.3 (15070) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 646.286143] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.333356] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.368509] SELinux: duplicate or incompatible mount options 13:47:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xba00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 646.403831] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.437664] SELinux: duplicate or incompatible mount options 13:47:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 646.462796] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 13:47:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 646.509507] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.530362] SELinux: duplicate or incompatible mount options [ 646.545072] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.561543] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.596844] SELinux: duplicate or incompatible mount options [ 646.624187] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 13:47:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 646.672536] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.723668] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.735748] SELinux: duplicate or incompatible mount options [ 646.754853] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.771723] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.779410] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.796154] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.803028] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.803804] SELinux: duplicate or incompatible mount options [ 646.821939] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.837485] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.848615] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.877786] hid-generic 0000:0000:0000.0059: unknown main item tag 0x0 [ 646.896216] hid-generic 0000:0000:0000.0059: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000400000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f0000000020feff0000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c00000000000000400000000000000000000000000000000000000000001699199af6f1701659255d5a58bebe1ce23ba91748315eb9b854084ae7f29a389678826a7c49ff4455a22310723f672172d8bd74984f0f0499bce875626ad6f66d9c0664b485913ba80760c9c6965ef308"], 0x12e) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8b01, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1f, 0x2000) readv(r2, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/227, 0xe3}, {&(0x7f0000000240)=""/73, 0x49}], 0x2) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:55 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x1100, @dev}, 0x10) shutdown(r0, 0x1) 13:47:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xbe01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 647.023352] SELinux: duplicate or incompatible mount options [ 647.041083] IPVS: ftp: loaded support on port[0] = 21 13:47:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xc601, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 647.111090] SELinux: duplicate or incompatible mount options 13:47:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xcd00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 647.268850] SELinux: duplicate or incompatible mount options [ 647.314203] SELinux: duplicate or incompatible mount options 13:47:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xd602, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 647.443251] SELinux: duplicate or incompatible mount options [ 647.633925] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.640738] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.668651] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.707909] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.727343] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.758443] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.773179] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.788014] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.809898] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.823950] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 647.869873] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 13:47:56 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xe803, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:56 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x2c01, @dev}, 0x10) shutdown(r0, 0x1) [ 647.935812] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 13:47:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_IO(r4, 0x2285, &(0x7f0000001540)={0x0, 0xfffffffffffffffc, 0x89, 0x0, @scatter={0x2, 0x0, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/159, 0x9f}, {&(0x7f0000000240)=""/60, 0x3c}]}, &(0x7f0000000480)="fd401ce992389f25c4cd9abfa0305ec60c3920c2d83296b24e56fe1ed79309045533b462646f13a2a5a0015a6c12862e579d49af521647508b018713fb062d9138388a5acdf9297193f432b7b753e7845fdf78776537479af42acaad61b4c60bd43c66297079e038a568f41275d99edca01f88ae9daf9f0cf718261063f85dd33a550edcce35eace87", &(0x7f0000000540)=""/4096, 0x45, 0x4, 0xffffffffffffffff, &(0x7f0000000340)}) shutdown(r2, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000080)={r6, 0x1}, 0x8) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) [ 647.984907] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.012565] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 13:47:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xea02, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 648.052654] SELinux: duplicate or incompatible mount options [ 648.066292] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.078823] IPVS: ftp: loaded support on port[0] = 21 13:47:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x20000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 648.121626] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.171418] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 13:47:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xec00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 648.216775] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.231636] SELinux: duplicate or incompatible mount options [ 648.256391] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.275179] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.282009] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.289419] hid-generic 0000:0000:0000.005A: unknown main item tag 0x0 [ 648.314347] hid-generic 0000:0000:0000.005A: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 648.314907] SELinux: duplicate or incompatible mount options 13:47:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 648.500243] SELinux: duplicate or incompatible mount options 13:47:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:47:57 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xf003, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 648.571673] SELinux: duplicate or incompatible mount options [ 648.665172] SELinux: duplicate or incompatible mount options 13:47:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xf303, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 648.713541] SELinux: duplicate or incompatible mount options 13:47:57 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x3f00, @dev}, 0x10) shutdown(r0, 0x1) [ 648.902303] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 648.914533] IPVS: ftp: loaded support on port[0] = 21 [ 648.933437] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 648.975352] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 648.998313] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.019971] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.042661] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.057332] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.070945] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.088971] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.103430] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.118015] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.133893] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.148545] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.171472] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.186981] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.211715] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.228695] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.243887] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.286653] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.338099] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.362292] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.386110] hid-generic 0000:0000:0000.005B: unknown main item tag 0x0 [ 649.420460] hid-generic 0000:0000:0000.005B: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:58 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsu\x00', 0x200000, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000080), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xfc03, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:47:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 649.574242] SELinux: duplicate or incompatible mount options 13:47:58 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0xdc05, @dev}, 0x10) shutdown(r0, 0x1) [ 649.626957] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.646928] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.656106] SELinux: duplicate or incompatible mount options 13:47:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xfe01, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 649.696625] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.719772] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.735474] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 13:47:58 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 649.742336] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.747355] IPVS: ftp: loaded support on port[0] = 21 [ 649.749220] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.761073] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.777171] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.789507] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.798742] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.805817] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.812648] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.819493] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.826354] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.833167] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.840246] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.847117] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.854003] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.860818] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.867661] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.874555] hid-generic 0000:0000:0000.005C: unknown main item tag 0x0 [ 649.883207] hid-generic 0000:0000:0000.005C: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 649.940225] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 649.976233] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 13:47:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0xff00, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 650.033315] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.049128] SELinux: duplicate or incompatible mount options [ 650.064744] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.083402] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.099341] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.106690] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 13:47:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 650.133549] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.142339] SELinux: duplicate or incompatible mount options [ 650.161190] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.183654] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.226777] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.246854] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.268188] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.286882] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.301719] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.328265] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.343140] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.358063] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.372917] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.399527] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.414297] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.435665] hid-generic 0000:0000:0000.005D: unknown main item tag 0x0 [ 650.496266] hid-generic 0000:0000:0000.005D: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:47:59 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000233779fbff8960f0000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000"/261], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000240)={0x1, 0x0, 0x1}, &(0x7f0000000340)=[{}]) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x4, 0x2, 0x6000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) tkill(0x0, 0x2) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000003c0)={0xd3, 0x9, 0x2, 0x7, 0x8, 0x400}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 13:47:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x40000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 650.630787] SELinux: duplicate or incompatible mount options 13:47:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x100000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 650.703674] SELinux: duplicate or incompatible mount options 13:47:59 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xa}}, 0x10) shutdown(r0, 0x1) 13:47:59 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$char_raw(r2, &(0x7f0000000400)={""/434}, 0x200) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000240)={0x1e, 0x20, 0x6, 0x18, 0x0, 0x7, 0x1, 0x9e, 0x1}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$cgroup_ro(r6, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:47:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:47:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1fffff, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:47:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:47:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 650.953839] SELinux: duplicate or incompatible mount options [ 650.972645] IPVS: ftp: loaded support on port[0] = 21 [ 650.978838] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 650.995898] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 13:48:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x1000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 651.025613] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.036585] SELinux: duplicate or incompatible mount options 13:48:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 651.063103] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.118091] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.147459] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.158479] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 13:48:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 651.188076] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.205466] SELinux: duplicate or incompatible mount options [ 651.230283] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.247181] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.272335] SELinux: duplicate or incompatible mount options [ 651.288431] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 13:48:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 651.322662] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.360210] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.390478] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.412977] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.430346] SELinux: duplicate or incompatible mount options 13:48:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 651.472506] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.515822] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.542330] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.589745] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.627225] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 651.634214] [ 651.634219] ====================================================== [ 651.634221] WARNING: possible circular locking dependency detected [ 651.634227] 4.19.134-syzkaller #0 Not tainted [ 651.634230] ------------------------------------------------------ [ 651.634235] kworker/1:0/19 is trying to acquire lock: [ 651.634240] 00000000748e17d1 (&qdisc_tx_lock){+.-.}, at: red_adaptative_timer+0x92/0x5c0 [ 651.634268] [ 651.634268] but task is already holding lock: [ 651.634271] 00000000e010beb1 ((&q->adapt_timer)){+.-.}, at: call_timer_fn+0xc9/0x700 [ 651.634300] [ 651.634300] which lock already depends on the new lock. [ 651.634300] [ 651.634302] [ 651.634302] the existing dependency chain (in reverse order) is: [ 651.634305] [ 651.634305] -> #1 ((&q->adapt_timer)){+.-.}: [ 651.634320] red_destroy+0x15/0x60 [ 651.634330] qdisc_destroy+0x180/0x780 [ 651.634338] red_change+0x514/0x1080 [ 651.634346] tc_modify_qdisc+0xf6a/0x1a80 [ 651.634355] rtnetlink_rcv_msg+0x453/0xb80 [ 651.634363] netlink_rcv_skb+0x160/0x440 [ 651.634371] netlink_unicast+0x4d5/0x690 [ 651.634380] netlink_sendmsg+0x6bb/0xc40 [ 651.634390] sock_sendmsg+0xc3/0x120 [ 651.634400] ___sys_sendmsg+0x7bb/0x8e0 [ 651.634416] __x64_sys_sendmsg+0x132/0x220 [ 651.634426] do_syscall_64+0xf9/0x620 [ 651.634440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.634442] [ 651.634442] -> #0 (&qdisc_tx_lock){+.-.}: [ 651.634457] _raw_spin_lock+0x2a/0x40 [ 651.634466] red_adaptative_timer+0x92/0x5c0 [ 651.634476] call_timer_fn+0x177/0x700 [ 651.634485] expire_timers+0x243/0x4e0 [ 651.634494] run_timer_softirq+0x21c/0x670 [ 651.634503] __do_softirq+0x26c/0x9a0 [ 651.634520] irq_exit+0x215/0x260 [ 651.634530] smp_apic_timer_interrupt+0x136/0x550 [ 651.634539] apic_timer_interrupt+0xf/0x20 [ 651.634549] console_unlock+0xe7b/0x1110 [ 651.634558] vprintk_emit+0x2d1/0x740 [ 651.634567] dev_vprintk_emit+0x2e3/0x640 [ 651.634575] dev_printk_emit+0xbb/0xf0 [ 651.634583] __dev_printk+0x108/0x260 [ 651.634590] _dev_warn+0xd8/0x110 [ 651.634601] hid_parser_main+0x65d/0xb60 [ 651.634611] hid_open_report+0x355/0x6e0 [ 651.634620] hid_generic_probe+0x4a/0x90 [ 651.634630] hid_device_probe+0x29e/0x3d0 [ 651.634639] really_probe+0x58c/0x7e0 [ 651.634649] driver_probe_device+0xf9/0x200 [ 651.634659] __device_attach_driver+0x28b/0x310 [ 651.634668] bus_for_each_drv+0x159/0x1e0 [ 651.634677] __device_attach+0x298/0x3d0 [ 651.634687] bus_probe_device+0x1ea/0x2a0 [ 651.634695] device_add+0xac3/0x1610 [ 651.634704] hid_add_device+0x344/0x9e0 [ 651.634713] uhid_device_add_worker+0x3a/0x150 [ 651.634722] process_one_work+0x864/0x1570 [ 651.634730] worker_thread+0x64c/0x1130 [ 651.634740] kthread+0x30b/0x410 [ 651.634750] ret_from_fork+0x24/0x30 [ 651.634753] [ 651.634753] other info that might help us debug this: [ 651.634753] [ 651.634756] Possible unsafe locking scenario: [ 651.634756] [ 651.634758] CPU0 CPU1 [ 651.634761] ---- ---- [ 651.634762] lock((&q->adapt_timer)); [ 651.634768] lock(&qdisc_tx_lock); [ 651.634774] lock((&q->adapt_timer)); [ 651.634779] lock(&qdisc_tx_lock); [ 651.634784] [ 651.634784] *** DEADLOCK *** [ 651.634784] [ 651.634791] 5 locks held by kworker/1:0/19: [ 651.634793] #0: 00000000e104779b ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 [ 651.634830] #1: 0000000013ab6314 ((work_completion)(&uhid->worker)){+.+.}, at: process_one_work+0x79c/0x1570 [ 651.634848] #2: 000000006844c2ce (&dev->mutex){....}, at: __device_attach+0x7a/0x3d0 [ 651.634867] #3: 000000004b32a696 (console_lock){+.+.}, at: dev_vprintk_emit+0x2e3/0x640 [ 651.634885] #4: 00000000e010beb1 ((&q->adapt_timer)){+.-.}, at: call_timer_fn+0xc9/0x700 [ 651.634903] [ 651.634903] stack backtrace: [ 651.634914] CPU: 1 PID: 19 Comm: kworker/1:0 Not tainted 4.19.134-syzkaller #0 [ 651.634920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.634932] Workqueue: events uhid_device_add_worker [ 651.634937] Call Trace: [ 651.634942] [ 651.634954] dump_stack+0x1fc/0x2fe [ 651.634967] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 651.634980] __lock_acquire+0x30c9/0x3ff0 [ 651.634996] ? mark_held_locks+0xf0/0xf0 [ 651.635008] ? mark_held_locks+0xf0/0xf0 [ 651.635016] ? mod_timer+0x4ea/0x1010 [ 651.635030] ? mark_held_locks+0xf0/0xf0 [ 651.635041] ? __lock_acquire+0x6de/0x3ff0 [ 651.635058] lock_acquire+0x170/0x3c0 [ 651.635070] ? red_adaptative_timer+0x92/0x5c0 [ 651.635083] _raw_spin_lock+0x2a/0x40 [ 651.635094] ? red_adaptative_timer+0x92/0x5c0 [ 651.635105] red_adaptative_timer+0x92/0x5c0 [ 651.635117] call_timer_fn+0x177/0x700 [ 651.635127] ? red_peek+0x90/0x90 [ 651.635137] ? process_timeout+0x40/0x40 [ 651.635150] ? mark_held_locks+0xa6/0xf0 [ 651.635162] ? _raw_spin_unlock_irq+0x24/0x80 [ 651.635171] ? red_peek+0x90/0x90 [ 651.635182] ? red_peek+0x90/0x90 [ 651.635193] expire_timers+0x243/0x4e0 [ 651.635206] run_timer_softirq+0x21c/0x670 [ 651.635217] ? expire_timers+0x4e0/0x4e0 [ 651.635243] ? check_preemption_disabled+0x41/0x280 [ 651.635256] __do_softirq+0x26c/0x9a0 [ 651.635271] irq_exit+0x215/0x260 [ 651.635282] smp_apic_timer_interrupt+0x136/0x550 [ 651.635292] apic_timer_interrupt+0xf/0x20 [ 651.635296] [ 651.635307] RIP: 0010:console_unlock+0xe7b/0x1110 [ 651.635318] Code: ff df 48 c1 e8 03 80 3c 08 00 0f 85 66 02 00 00 48 83 3d 9f d4 7d 07 00 0f 84 9e 00 00 00 e8 8c 28 15 00 48 8b 7c 24 30 57 9d <0f> 1f 44 00 00 e9 9b fc ff ff e8 76 28 15 00 0f 0b e8 6f 28 15 00 [ 651.635324] RSP: 0018:ffff8880a9f7f380 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 651.635334] RAX: ffff8880a9f70500 RBX: 0000000000000200 RCX: dffffc0000000000 [ 651.635341] RDX: 0000000000000000 RSI: ffffffff815486b4 RDI: 0000000000000293 [ 651.635347] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 651.635353] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff845c88d0 [ 651.635359] R13: 000000000000004a R14: 0000000000000000 R15: ffffffff894602d0 [ 651.635371] ? netconsole_netdev_event+0x280/0x280 [ 651.635383] ? console_unlock+0xe74/0x1110 [ 651.635399] vprintk_emit+0x2d1/0x740 [ 651.635410] dev_vprintk_emit+0x2e3/0x640 [ 651.635421] ? get_device_parent+0x5b0/0x5b0 [ 651.635437] ? mark_held_locks+0xa6/0xf0 [ 651.635449] ? finish_task_switch+0x118/0x780 [ 651.635461] ? _raw_spin_unlock_irq+0x24/0x80 [ 651.635472] dev_printk_emit+0xbb/0xf0 [ 651.635481] ? dev_vprintk_emit+0x640/0x640 [ 651.635492] ? __schedule+0x88f/0x2040 [ 651.635501] ? process_one_work+0x864/0x1570 [ 651.635528] __dev_printk+0x108/0x260 [ 651.635538] _dev_warn+0xd8/0x110 [ 651.635548] ? uevent_store+0x70/0x70 [ 651.635560] ? retint_kernel+0x2d/0x2d [ 651.635575] ? hid_concatenate_last_usage_page+0x57/0x210 [ 651.635586] ? hid_parser_main+0xc5/0xb60 [ 651.635598] hid_parser_main+0x65d/0xb60 [ 651.635608] ? fetch_item+0x187/0x520 [ 651.635620] hid_open_report+0x355/0x6e0 [ 651.635632] ? hid_device_release+0x50/0x50 [ 651.635643] ? wait_for_completion_io+0x10/0x10 [ 651.635652] ? bus_for_each_dev+0x1d0/0x1d0 [ 651.635664] ? hid_match_id+0x27a/0x300 [ 651.635675] ? __check_hid_generic+0x50/0x50 [ 651.635685] hid_generic_probe+0x4a/0x90 [ 651.635696] hid_device_probe+0x29e/0x3d0 [ 651.635707] ? hid_generic_probe+0x90/0x90 [ 651.635718] ? hid_match_device+0x390/0x390 [ 651.635729] really_probe+0x58c/0x7e0 [ 651.635741] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 651.635753] driver_probe_device+0xf9/0x200 [ 651.635765] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 651.635777] __device_attach_driver+0x28b/0x310 [ 651.635788] ? __driver_attach+0x380/0x380 [ 651.635797] bus_for_each_drv+0x159/0x1e0 [ 651.635808] ? bus_for_each_dev+0x1d0/0x1d0 [ 651.635821] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 651.635833] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 651.635845] __device_attach+0x298/0x3d0 [ 651.635855] ? really_probe+0x7e0/0x7e0 [ 651.635868] ? kobject_uevent_env+0x2aa/0x1220 [ 651.635879] bus_probe_device+0x1ea/0x2a0 [ 651.635890] ? blocking_notifier_call_chain+0x54/0xa0 [ 651.635900] device_add+0xac3/0x1610 [ 651.635912] ? device_check_offline+0x280/0x280 [ 651.635924] ? __debugfs_create_file+0x356/0x4e0 [ 651.635937] hid_add_device+0x344/0x9e0 [ 651.635950] ? modalias_show+0x150/0x150 [ 651.635961] ? check_preemption_disabled+0x41/0x280 [ 651.635973] uhid_device_add_worker+0x3a/0x150 [ 651.635983] process_one_work+0x864/0x1570 [ 651.635995] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 651.636009] worker_thread+0x64c/0x1130 [ 651.636022] ? process_one_work+0x1570/0x1570 [ 651.636033] kthread+0x30b/0x410 [ 651.636044] ? kthread_park+0x180/0x180 [ 651.636056] ret_from_fork+0x24/0x30 13:48:01 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0xc0}}, 0x10) shutdown(r0, 0x1) 13:48:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:01 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) [ 652.595293] SELinux: duplicate or incompatible mount options [ 652.619957] IPVS: ftp: loaded support on port[0] = 21 13:48:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:48:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x18030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 652.652378] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 652.652912] SELinux: duplicate or incompatible mount options [ 652.691099] hid-generic 0000:0000:0000.005E: unknown main item tag 0x0 [ 652.732491] hid-generic 0000:0000:0000.005E: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:48:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:48:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x20000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 652.849108] SELinux: duplicate or incompatible mount options [ 652.858561] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 652.870722] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 652.881430] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 13:48:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x24020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 652.902617] SELinux: duplicate or incompatible mount options [ 652.959594] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 652.982209] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 13:48:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x28020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 653.023990] SELinux: duplicate or incompatible mount options [ 653.027707] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 13:48:02 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0xc0}}, 0x10) shutdown(r0, 0x1) 13:48:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 653.066391] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.076190] SELinux: duplicate or incompatible mount options [ 653.093667] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.131635] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.149372] IPVS: ftp: loaded support on port[0] = 21 [ 653.149504] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.168084] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.192620] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.207114] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.222800] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.236213] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.279432] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.304175] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.321950] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.340459] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.355743] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.375583] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 13:48:02 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x280001) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="e4000000121400012bbd7000fcdbdf0508004be50fa1c6cc6db1c0000013000000082072e200400000"], 0x20}, 0x1, 0x0, 0x0, 0x4040005}, 0x8000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) 13:48:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2a020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 653.392706] hid-generic 0000:0000:0000.005F: unknown main item tag 0x0 [ 653.425952] hid-generic 0000:0000:0000.005F: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 653.484841] SELinux: duplicate or incompatible mount options 13:48:02 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:48:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) 13:48:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2c010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 653.527753] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.561336] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.591690] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.606826] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.608786] SELinux: duplicate or incompatible mount options [ 653.626269] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 13:48:02 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 653.651406] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.674291] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 13:48:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x2c020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 653.696311] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.706382] SELinux: duplicate or incompatible mount options [ 653.739203] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.771277] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.790526] SELinux: duplicate or incompatible mount options [ 653.799745] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.814265] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 13:48:02 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) shutdown(r0, 0x1) [ 653.829594] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.836854] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.851956] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.861340] SELinux: duplicate or incompatible mount options 13:48:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 653.892416] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.902029] IPVS: ftp: loaded support on port[0] = 21 [ 653.921562] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.947726] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.963901] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.972450] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 653.976964] SELinux: duplicate or incompatible mount options [ 654.002650] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 654.017930] hid-generic 0000:0000:0000.0060: unknown main item tag 0x0 [ 654.033821] hid-generic 0000:0000:0000.0060: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 654.084484] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.091193] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.130690] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.156585] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.174405] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.189410] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.206740] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.224723] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.239720] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.257787] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.278760] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.297280] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.312306] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.343009] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.351111] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.358085] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.365579] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.372342] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.379311] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.386087] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 13:48:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x32000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:48:03 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, 0x10) shutdown(r0, 0x1) 13:48:03 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000240)={0x0, 0xfffffffffffffffe, 0xcf, 0x6, @buffer={0x0, 0xcd, &(0x7f0000000340)=""/205}, &(0x7f0000000440)="6a5adf177943f6a0b6919c012a469a648d98fda3f81a8a5e85adf0e67e6c0aba024d255da281692b28373adb81006bf44c2aa8b19dd0cc3a154918b36eefbcdbfb086b7c64c2bfe86508324146525972cc7cab2b9d1e342c37345ecb400145cec6d725d86f9b19bd54eafcfea46230955c0253e3a5557ff457c0a38e2c96dce930f49919d18d07b4d69bc77dc94b3bc0e3b2845592048e18a3f039a2c4212f0d5af9d53bbea8e9cd8ed07326f316d7c1cd8f35f736a30acc3b0040896f6bd9ec830a96e60094e2913587d405ccacf8", &(0x7f0000000540)=""/181, 0x5, 0x6, 0x0, &(0x7f0000000080)}) 13:48:03 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 654.416478] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.427604] hid-generic 0000:0000:0000.0061: unknown main item tag 0x0 [ 654.446574] hid-generic 0000:0000:0000.0061: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 654.524986] SELinux: duplicate or incompatible mount options [ 654.531758] IPVS: ftp: loaded support on port[0] = 21 [ 654.543322] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.550027] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 13:48:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x3f000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 654.572035] SELinux: duplicate or incompatible mount options [ 654.590586] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.602708] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 13:48:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x40000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 654.627328] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.656276] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.698744] SELinux: duplicate or incompatible mount options [ 654.699545] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 13:48:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4a020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 654.741772] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 13:48:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 654.782944] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 13:48:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4c010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 654.828518] SELinux: duplicate or incompatible mount options [ 654.834174] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.865463] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.872255] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.881026] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.897323] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.907810] SELinux: duplicate or incompatible mount options 13:48:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, @TCA_RED_MAX_P={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 654.926489] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.936896] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 654.998465] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.033445] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.050212] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.064862] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.080434] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.107933] hid-generic 0000:0000:0000.0062: unknown main item tag 0x0 [ 655.123840] hid-generic 0000:0000:0000.0062: hidraw0: HID v0.00 Device [syz1] on sz͏DJ 13:48:04 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}, 0x10) shutdown(r0, 0x1) [ 655.287458] IPVS: ftp: loaded support on port[0] = 21 13:48:04 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_CAPS(r2, 0x80044dfc, &(0x7f0000000200)) 13:48:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x3}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:48:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x4e010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:04 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 655.445443] SELinux: duplicate or incompatible mount options [ 655.471078] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.482510] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. 13:48:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x50010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 655.495046] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.518658] SELinux: duplicate or incompatible mount options [ 655.534438] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 13:48:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x5caa44fc, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 655.550417] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.581997] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.590433] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. 13:48:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x52000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 655.601958] SELinux: duplicate or incompatible mount options 13:48:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x35}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 655.654809] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.687245] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 13:48:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x60030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:04 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x6}}, 0x10) shutdown(r0, 0x1) [ 655.709036] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.725183] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.726475] SELinux: duplicate or incompatible mount options [ 655.773794] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.792266] IPVS: ftp: loaded support on port[0] = 21 [ 655.802061] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.811484] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.818411] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.833686] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 655.850138] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.859424] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.875625] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.898831] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.932029] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.954207] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.969402] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.987574] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 655.995030] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 656.001857] hid-generic 0000:0000:0000.0063: unknown main item tag 0x0 [ 656.012002] hid-generic 0000:0000:0000.0063: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 656.052851] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 656.065634] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. [ 656.266322] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.281441] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.299083] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.314269] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.331326] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.338124] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.345010] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.351847] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.359108] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.367319] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.374060] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.380784] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.387541] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.394312] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.401020] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.408014] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.414781] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.421523] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.428267] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.434977] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.441669] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 [ 656.448423] hid-generic 0000:0000:0000.0064: unknown main item tag 0x0 13:48:05 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000100)=0x32b3, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/117, 0x75}], 0x1) 13:48:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:48:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x62010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x10c}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:48:05 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) [ 656.460504] hid-generic 0000:0000:0000.0064: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 656.519488] IPVS: ftp: loaded support on port[0] = 21 [ 656.527180] SELinux: duplicate or incompatible mount options [ 656.551992] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 13:48:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 656.563490] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.583233] SELinux: duplicate or incompatible mount options [ 656.591511] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 13:48:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x62020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 656.627420] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 656.644115] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 13:48:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 656.683206] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.693689] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.722047] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 13:48:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6a010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 656.751377] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.767583] SELinux: duplicate or incompatible mount options [ 656.785442] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 13:48:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x6e020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 656.830562] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.841811] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.887207] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.900650] SELinux: duplicate or incompatible mount options [ 656.925267] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.948853] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.964904] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 656.988361] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.008291] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.024112] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.051478] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.067900] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.098238] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.115140] hid-generic 0000:0000:0000.0065: unknown main item tag 0x0 [ 657.131578] hid-generic 0000:0000:0000.0065: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 657.349673] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.359558] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.376522] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.383278] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.390000] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.398892] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.407409] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.416520] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.423282] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.430000] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.439127] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.445886] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.454606] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.461317] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.468060] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.476796] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.483553] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.490261] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 13:48:06 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f0000000080)=""/6, 0x6) 13:48:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:06 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) shutdown(r0, 0x1) 13:48:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x70000000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) 13:48:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0x12c}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) [ 657.499069] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.505822] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.514072] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.520762] hid-generic 0000:0000:0000.0066: unknown main item tag 0x0 [ 657.533184] hid-generic 0000:0000:0000.0066: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 657.586616] IPVS: ftp: loaded support on port[0] = 21 [ 657.597711] SELinux: duplicate or incompatible mount options 13:48:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 657.640675] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.651213] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.663358] SELinux: duplicate or incompatible mount options [ 657.670448] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 13:48:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x72020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 657.720511] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.748254] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. [ 657.771376] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.799125] SELinux: duplicate or incompatible mount options [ 657.803903] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. 13:48:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x76030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0xe74}, @TCA_RED_STAB={0x104, 0x2, "3228d02c2041406c126298907587a6f739add4a0082c5234bec30bfc6876b571465545275c91fd8fbe49753360f2f44f1c2b8c5e8086428a93ab67efc68df1e06d89f87bf525e66963210e38d9c09f1036f3f819825f5a546996a71be493bd66e346ec20dcb540f1273e2a19ad53b5980dfdaa9044dcbd806345ca3728884eeb6e2732acae9ba54a9e337ef8e3067b3554762739abd27ef4a7711d51e0bf9fe26f37a278198059432a6d5d8bbf5fb3abdaa0c6db4c2ad3f8ea7ed82e827a27faa4491c972fc17696fabbc5cf5467ed72c0ec784daaca0f49350c953655ede706cb115f11c6b598aa0a1026feda9eb61b7daefc22f9fe59decf8e712e707b6396"}]}}]}, 0x150}}, 0x0) [ 657.821646] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.858944] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.868704] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.869266] SELinux: duplicate or incompatible mount options [ 657.894965] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.914973] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 13:48:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x80030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 657.949439] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. [ 657.960771] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 657.994900] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.008109] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.014499] SELinux: duplicate or incompatible mount options [ 658.023387] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.039910] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. [ 658.061692] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.077526] SELinux: duplicate or incompatible mount options [ 658.094336] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.101688] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.108735] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.136927] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.147002] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.164703] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.178129] hid-generic 0000:0000:0000.0067: unknown main item tag 0x0 [ 658.194915] hid-generic 0000:0000:0000.0067: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 658.430962] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.439536] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.452352] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.459082] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.465810] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.472599] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.479602] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.486390] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.493413] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.500126] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.506875] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.513621] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.520321] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.527498] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.535606] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.542326] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.549059] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.555805] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.562528] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.569317] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 13:48:07 executing program 3: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffd4e) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000200)='\x1e\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/\x00', &(0x7f0000000340)='@\x00', &(0x7f0000000380)='+^!.,]{{!\x00'], &(0x7f0000000480)=[&(0x7f0000000400)='($/\':&()}@,!{^[\x00', &(0x7f0000000440)='**/,-\'$&#!*^!%)&\x00']) 13:48:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x82010000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:48:07 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x150, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_MAX_P={0xe7c}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x150}}, 0x0) 13:48:07 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) shutdown(r0, 0x1) 13:48:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a31190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000ca8887345d126cc6000000000000000067f328b40000000000000000000000000000140000000000000000000000000000000000000010000000000000000100738d7acd8f444abdad110f000000002000000000000000000000000000000000000000df0000000000200000000000000000100000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000004000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x9dae) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x51, 0x8, 0x0, {0x4, 0x200}, {0x3ff, 0x2}, @cond=[{0x1ff, 0x0, 0x2, 0x401, 0x20, 0x4}, {0x3ff, 0xfff7, 0x6, 0x7, 0x80, 0x1}]}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}, {0x0}], 0x2) [ 658.576230] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.582963] hid-generic 0000:0000:0000.0068: unknown main item tag 0x0 [ 658.594072] hid-generic 0000:0000:0000.0068: hidraw0: HID v0.00 Device [syz1] on sz͏DJ [ 658.657332] SELinux: duplicate or incompatible mount options [ 658.670046] IPVS: ftp: loaded support on port[0] = 21 [ 658.688998] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 13:48:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x92020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 658.707769] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.730641] SELinux: duplicate or incompatible mount options [ 658.740587] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.0'. 13:48:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:07 executing program 3: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) connect$rds(r0, &(0x7f0000002580)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSFF(r3, 0x40304580, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/117, 0x75}], 0x1) sendmsg$tipc(r3, &(0x7f0000000280)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x0, 0x2}, 0x3}}, 0x10, &(0x7f0000002500)=[{&(0x7f0000000340)="9910e3db33366c42eef09963e40b307d5a140eecd4a8c8dcd6effbbbda422d03ee122e4dbaa4190837e22a58a3a1518dcc18638e6f96a4b35415c697c10508056feba3f9edfb9fd4abef7b25189fb54ca5db97ed6adcf05cce7e8042ec8eb7de36c20cd5b689c94748fced845fa8d56310ca56c8d1ff8a72139ca5f12a370303e04fb2e1717c753e862de85cbde8d1bbe30b935165a0604211c18ef2c51748aee72c33b9a0fb07efafee84b8de18640e366d9595ec4b297c6384982287167436d5c2c3c4287623d88a7be28e69e3e8343f20e5a28c4eb497ea9f26f58ebd86eb144d8fe50c216223fa3b73", 0xeb}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000240)="4ef989237d5a1e143d9941806b22cce96bad1165a7f554f3fb3b099dee297abca6f82ceab2202bd056749d", 0x2b}, {&(0x7f0000001440)="ac44dba26407b2ed9751c67ebdcca5404339b3cbc6921237002a5912e8081582f1c08b899e8678da20a87f83d814a5543fa01db58e3980b405b96019d4b629cd77b0f8fae757b03f57e5728ac614c1081bffbebd07f82d461ba6431a58262739e42dd0067f22dc3aee6c3ce6a9e5b685bf62b4f57e8c4a226178b1fd5f43b980a8a1380d4c319d51dee149d1bda4e4828d553e6d561860ca823734da80ab2088bc79f038a4d5275f6cef4d9ad856ffda99f4bf97309b399da05d4d76", 0xbc}, {&(0x7f0000001500)="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", 0x1000}], 0x5, 0x0, 0x0, 0x8000}, 0x1) [ 658.777903] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 13:48:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x98030000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 658.826999] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.859208] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.866038] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.878615] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.886191] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.890494] SELinux: duplicate or incompatible mount options [ 658.905871] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 13:48:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfc44aa5c, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 13:48:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148, 0x360, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x9f020000, 'ip6gretap0\x00', 'team_slave_0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @pinned={0x2, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 658.928255] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.954670] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 658.989634] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 659.008703] SELinux: duplicate or incompatible mount options [ 659.011554] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 [ 659.028131] hid-generic 0000:0000:0000.0069: unknown main item tag 0x0 13:48:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x488, 0x360, 0x0, 0x148